First published: Thu Oct 07 2021(Updated: )
An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/coreos-installer | <0.10.1 | 0.10.1 |
Redhat Coreos-installer | <0.10.1 |
https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20319 has been categorized with a high severity due to the potential for an attacker to bypass signature verification and install unsigned content.
To fix CVE-2021-20319, upgrade the coreos-installer package to version 0.10.1 or higher.
CVE-2021-20319 is an improper signature verification vulnerability that affects the coreos-installer.
An attacker can modify the installation image to bypass signature verification, potentially leading to the installation of malicious or unsigned content.
CVE-2021-20319 affects the coreos-installer package from Red Hat up to version 0.10.1.