In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://github.com/facebook/zstd/issues/1630 | Exploit Issue Tracking Third Party Advisory |
https://www.facebook.com/security/advisories/cve-2021-24031 | Vendor Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://github.com/facebook/zstd/issues/1630 | Exploit Issue Tracking Third Party Advisory |
https://www.facebook.com/security/advisories/cve-2021-24031 | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404 - Exploit, Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://github.com/facebook/zstd/issues/1630 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.facebook.com/security/advisories/cve-2021-24031 - Vendor Advisory |
Information
Published : 2021-03-04 21:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24031
Mitre link : CVE-2021-24031
CVE.ORG link : CVE-2021-24031
JSON object : View
Products Affected
- zstandard