bzfs@1.3.0 vulnerabilities

bzfs is a reliable near real-time, parallel replication and backup command-line tool for ZFS. It replicates snapshots from many local or remote source ZFS datasets (and their descendants) to local or remote destination datasets, using zfs send/receive and ssh, and can operate at sub-second intervals across large fleets of hosts.

  • latest version

    1.15.1

  • latest non vulnerable version

  • first published

    1 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the bzfs package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Incorrect Default Permissions

    bzfs is a bzfs is a reliable near real-time, parallel replication and backup command-line tool for ZFS. It replicates snapshots from many local or remote source ZFS datasets (and their descendants) to local or remote destination datasets, using zfs send/receive and ssh, and can operate at sub-second intervals across large fleets of hosts.

    Affected versions of this package are vulnerable to Incorrect Default Permissions due to the use of os.makedirs() without enforcing a restrictive umask when creating temporary directories. This causes the directories to inherit overly permissive default permissions, allowing unauthorized users to read or modify sensitive files stored within them. An attacker can exploit this by accessing or tampering with these improperly protected directories, potentially leading to information disclosure or data corruption.

    How to fix Incorrect Default Permissions?

    Upgrade bzfs to version 1.14.0 or higher.

    [,1.14.0)