Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-29499
HistoryMay 07, 2021 - 8:50 p.m.

CVE-2021-29499 Predictable SIF UUID Identifiers

2021-05-0720:50:09
CWE-330
GitHub_M
www.cve.org
2
cve-2021-29499
singularity container image format
open source
siftool new command
github.com/satori/go.uuid
dependency
patch
upgrade
workaround
createinfo struct

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

70.0%

SIF is an open source implementation of the Singularity Container Image Format. The siftool new command and func siftool.New() produce predictable UUID identifiers due to insecure randomness in the version of the github.com/satori/go.uuid module used as a dependency. A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. As a workaround, users passing CreateInfo struct should ensure the ID field is generated using a version of github.com/satori/go.uuid that is not vulnerable to this issue.

CNA Affected

[
  {
    "product": "sif",
    "vendor": "sylabs",
    "versions": [
      {
        "status": "affected",
        "version": "<= 1.2.2"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

70.0%

Related for CVELIST:CVE-2021-29499