CVE-2024-24579

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-24579
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-24579.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-24579
Aliases
Related
Published
2024-01-31T17:15:40Z
Modified
2024-05-13T20:10:54Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

stereoscope is a go library for processing container images and simulating a squash filesystem. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of github.com/anchore/stereoscope/pkg/file.UntarToDirectory() function, the github.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider struct, or the higher level github.com/anchore/stereoscope/pkg/image.Image.Read() function express this vulnerability. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.

References

Affected packages

Git / github.com/anchore/stereoscope

Affected ranges

Type
GIT
Repo
https://github.com/anchore/stereoscope
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed