{
  "threat_severity" : "Low",
  "public_date" : "2021-02-11T00:00:00Z",
  "bugzilla" : {
    "description" : "zstd: adds read permissions to files while being compressed or uncompressed",
    "id" : "1934852",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1934852"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-281",
  "details" : [ "In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.", "A flaw was found in zstd. While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled)." ],
  "statement" : "In OpenShift Container Platform (OCP) the zstd package was delivered in OCP 4.3 which is already end of life.",
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 3",
    "fix_state" : "Fix deferred",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "zstd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "zstd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Out of support scope",
    "package_name" : "zstd",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenStack Platform 16.1",
    "fix_state" : "Not affected",
    "package_name" : "zstd",
    "cpe" : "cpe:/a:redhat:openstack:16.1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-24031\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-24031" ],
  "name" : "CVE-2021-24031",
  "csaw" : false
}