Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-24032

Опубликовано: 11 фев. 2021
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.

A flaw was found in zstd. While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled).

Отчет

In OpenShift Container Platform (OCP) the zstd package was delivered in OCP 4.3 which is already end of life. This vulnerability can be considered low severity rather than moderate due to the fact that the elevated file permissions are only temporary and only exist during the compression or decompression process. Once the operation completes, the file permissions revert to their intended state, mirroring those of the input file. The risk is further minimized by the fact that the exposure window is brief, and the elevated permissions are not persistent. Additionally, the issue only arises during the processing of files, and only those with larger sizes or more involved operations would be at risk.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Security 3roxAffected
Red Hat Ceph Storage 3cephAffected
Red Hat Ceph Storage 7libzstdAffected
Red Hat Enterprise Linux 8zstdFix deferred
Red Hat Enterprise Linux 9zstdNot affected
Red Hat OpenShift Container Platform 4zstdOut of support scope
Red Hat OpenStack Platform 16.1zstdNot affected
Red Hat AMQ Streams 2.7.0FixedRHSA-2024:352730.05.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-281
https://bugzilla.redhat.com/show_bug.cgi?id=1928090zstd: Race condition allows attacker to access world-readable destination file

EPSS

Процентиль: 4%
0.0002
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
почти 5 лет назад

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.

CVSS3: 4.7
nvd
почти 5 лет назад

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.

CVSS3: 4.7
msrc
около 1 года назад

Описание отсутствует

CVSS3: 4.7
debian
почти 5 лет назад

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for ...

github
больше 3 лет назад

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.

EPSS

Процентиль: 4%
0.0002
Низкий

5.5 Medium

CVSS3