{"api_version":"1","generated_at":"2026-04-23T11:35:33+00:00","cve":"CVE-2021-20319","urls":{"html":"https://cve.report/CVE-2021-20319","api":"https://cve.report/api/cve/CVE-2021-20319.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-20319","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-20319"},"summary":{"title":"CVE-2021-20319","description":"An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-03-04 18:15:00","updated_at":"2022-03-11 15:37:00"},"problem_types":["CWE-347"],"metrics":[],"references":[{"url":"https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593","name":"https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593","refsource":"MISC","tags":[],"title":"coreos-installer < 0.10.1 improperly verifies GPG signature when decompressing gzipped artifact · Advisory · coreos/coreos-installer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89","name":"https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89","refsource":"MISC","tags":[],"title":"[release-0.10] io: check for EOF when decoding a gzip stream (CVE-2021-20319) by bgilbert · Pull Request #659 · coreos/coreos-installer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2011862","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2011862","refsource":"MISC","tags":[],"title":"2011862 – (CVE-2021-20319) CVE-2021-20319 coreos-installer: incorrect signature verification on gzip-compressed install images","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-20319","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20319","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"20319","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"coreos-installer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-20319","qid":"239734","title":"Red Hat OpenShift Container Platform 4.9 Security Update (RHSA-2021:3934)"},{"cve":"CVE-2021-20319","qid":"239744","title":"Red Hat OpenShift Container Platform 4.8 Security Update (RHSA-2021:3926)"},{"cve":"CVE-2021-20319","qid":"239745","title":"Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021:3930)"},{"cve":"CVE-2021-20319","qid":"239779","title":"Red Hat OpenShift Container Platform 4.6 Security Update (RHSA-2021:4008)"},{"cve":"CVE-2021-20319","qid":"282001","title":"Fedora Security Update for rust (FEDORA-2021-449a2bdaf3)"},{"cve":"CVE-2021-20319","qid":"282002","title":"Fedora Security Update for rust (FEDORA-2021-3d52eb54ca)"},{"cve":"CVE-2021-20319","qid":"770084","title":"Red Hat OpenShift Container Platform 4.9 Security Update (RHSA-2021:3934)"},{"cve":"CVE-2021-20319","qid":"770085","title":"Red Hat OpenShift Container Platform 4.8 Security Update (RHSA-2021:3926)"},{"cve":"CVE-2021-20319","qid":"770086","title":"Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021:3930)"},{"cve":"CVE-2021-20319","qid":"770087","title":"Red Hat OpenShift Container Platform 4.6 Security Update (RHSA-2021:4008)"},{"cve":"CVE-2021-20319","qid":"770095","title":"Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021-3930)"},{"cve":"CVE-2021-20319","qid":"770100","title":"Red Hat OpenShift Container Platform 4.6 Security Update (RHSA-2021-4008)"},{"cve":"CVE-2021-20319","qid":"770104","title":"Red Hat OpenShift Container Platform 4.8 Security Update (RHSA-2021-3926)"},{"cve":"CVE-2021-20319","qid":"770110","title":"Red Hat OpenShift Container Platform 4.9 Security Update (RHSA-2021-3934)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-20319","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"coreos-installer","version":{"version_data":[{"version_value":"Affects coreos-installer before v0.10.1, Fixed in v0.10.1."}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-347 - Improper Verification of Cryptographic Signature"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2011862","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2011862"},{"refsource":"MISC","name":"https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593","url":"https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593"},{"refsource":"MISC","name":"https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89","url":"https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89"}]},"description":{"description_data":[{"lang":"eng","value":"An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed."}]}},"nvd":{"publishedDate":"2022-03-04 18:15:00","lastModifiedDate":"2022-03-11 15:37:00","problem_types":["CWE-347"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:coreos-installer:*:*:*:*:*:*:*:*","versionEndExcluding":"0.10.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"20319","Ordinal":"194360","Title":"CVE-2021-20319","CVE":"CVE-2021-20319","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"20319","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}