Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-24579
HistoryJan 31, 2024 - 5:15 p.m.

Design/Logic Flaw

2024-01-3117:15:00
PRIOn knowledge base
www.prio-n.com
3
stereoscope
go library
design flaw
vulnerability
oci
tar archive
unarchive
file.untartodirectory()
image provider
read()
workaround
oci layout

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.5%

stereoscope is a go library for processing container images and simulating a squash filesystem. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of github.com/anchore/stereoscope/pkg/file.UntarToDirectory() function, the github.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider struct, or the higher level github.com/anchore/stereoscope/pkg/image.Image.Read() function express this vulnerability. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.

CPENameOperatorVersion
stereoscopelt0.0.1

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.5%

Related for PRION:CVE-2024-24579