Mageia alert MGASA-2021-0323 (zstd)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2021-0323: Updated zstd packages fix a security vulnerability | |
Date: | Fri, 09 Jul 2021 02:28:12 +0200 | |
Message-ID: | <20210709002812.B0018A0E5E@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2021-0323 - Updated zstd packages fix a security vulnerability Publication date: 09 Jul 2021 URL: https://advisories.mageia.org/MGASA-2021-0323.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-24032 Description: Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties (CVE-2021-24032). References: - https://bugs.mageia.org/show_bug.cgi?id=28444 - https://ubuntu.com/security/notices/USN-4760-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 8/core/zstd-1.4.8-1.1.mga8