Use of Insufficiently Random Values Affecting golang-github-sylabs-sif package, versions <2.3.1-2


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.62% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Insufficiently Random Values vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-GOLANGGITHUBSYLABSSIF-1290609
  • published4 Jul 2021
  • disclosed7 May 2021

Introduced: 7 May 2021

CVE-2021-29499  (opens in a new tab)
CWE-330  (opens in a new tab)

How to fix?

Upgrade Debian:unstable golang-github-sylabs-sif to version 2.3.1-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-sylabs-sif package and not the golang-github-sylabs-sif package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

SIF is an open source implementation of the Singularity Container Image Format. The siftool new command and func siftool.New() produce predictable UUID identifiers due to insecure randomness in the version of the github.com/satori/go.uuid module used as a dependency. A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. As a workaround, users passing CreateInfo struct should ensure the ID field is generated using a version of github.com/satori/go.uuid that is not vulnerable to this issue.

CVSS Base Scores

version 3.1