CVE-2024-38358 Affecting zellij package, versions <0.41.2-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-ZELLIJ-8400649
  • published21 Nov 2024
  • disclosed19 Jun 2024

Introduced: 19 Jun 2024

CVE-2024-38358  (opens in a new tab)

How to fix?

Upgrade Chainguard zellij to version 0.41.2-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zellij package and not the zellij package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both oflags::creat and rights::fd_write. Programs can also crash the runtime by creating a symlink pointing outside with path_symlink and path_opening the link. This issue has been addressed in commit b9483d022 which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.