First published: Fri May 07 2021(Updated: )
SIF is an open source implementation of the Singularity Container Image Format. The `siftool new` command and func siftool.New() produce predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. As a workaround, users passing CreateInfo struct should ensure the `ID` field is generated using a version of `github.com/satori/go.uuid` that is not vulnerable to this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sylabs Singularity Image Format | <1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29499 is a vulnerability in the Singularity Container Image Format (SIF) implementation of the `siftool new` command and the `siftool.New()` function that produces predictable UUID identifiers due to insecure randomness.
The severity of CVE-2021-29499 is high, with a CVSSv3 score of 7.5.
The Sylabs Singularity Image Format (SIF) version up to and excluding 1.2.3 is affected by CVE-2021-29499.
To fix CVE-2021-29499, update to the patched version of SIF that includes the fix.
You can find more information about CVE-2021-29499 at the following reference: [https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg](https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg)