First published: Tue Apr 06 2021(Updated: )
Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Umoci | <0.4.7 | |
Sylabs Singularity | <3.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2021-29136.
The severity of CVE-2021-29136 is medium with a CVSS score of 5.5.
The Linuxfoundation Umoci versions up to and exclusive of 0.4.7 and Sylabs Singularity versions up to and exclusive of 3.7.3 are affected by CVE-2021-29136.
An attacker can exploit CVE-2021-29136 by using a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used, allowing them to overwrite arbitrary host paths.
Yes, you can find references for CVE-2021-29136 at the following links: [Link 1](http://www.openwall.com/lists/oss-security/2021/04/06/2), [Link 2](https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57), [Link 3](https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v).