CVE-2021-3978

Publication date 29 January 2025

Last updated 30 July 2025


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Description

When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root ( https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service ) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation.

Status

Package Ubuntu Release Status
cfrpki 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Not affected
20.04 LTS focal Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
cfrpki

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Local
Attack complexity High
Privileges required Low
User interaction Required
Scope Changed
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H