First published: Tue Sep 28 2021(Updated: )
This release of Quay 3.5.7 includes:<br>Security Fix(es):<br><li> quay/claircore: directory traversal when scanning crafted container image layer allows for arbitrary file write (CVE-2021-3762)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quay for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3665 is classified as important due to the risk of arbitrary file write through directory traversal.
To fix RHSA-2021:3665, you should upgrade to Quay version 3.5.7 or later, which includes the necessary security patches.
RHSA-2021:3665 addresses the directory traversal vulnerability in quay/claircore, allowing for arbitrary file writes.
The potential impacts of RHSA-2021:3665 include unauthorized access to and manipulation of files on the filesystem.
Yes, systems running versions of Quay prior to 3.5.7 are vulnerable to the issues described in RHSA-2021:3665.