MGASA-2021-0322

Source
https://advisories.mageia.org/MGASA-2021-0322.html
Import Source
https://advisories.mageia.org/MGASA-2021-0322.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0322
Related
Published
2021-07-09T00:27:08Z
Modified
2021-07-08T23:13:46Z
Summary
Updated zstd packages fix a security vulnerability
Details

In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties (CVE-2021-24031).

References
Credits

Affected packages

Mageia:7 / zstd

Package

Name
zstd
Purl
pkg:rpm/mageia/zstd?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0-1.1.mga7

Ecosystem specific

{
    "section": "core"
}