CVE-2022-39237

Summary

CVECVE-2022-39237
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-10-06 18:16:00 UTC
Updated2023-07-14 17:24:00 UTC
Descriptionsyslabs/sif is the Singularity Image Format (SIF) reference implementation. In versions prior to 2.8.1the `github.com/sylabs/sif/v2/pkg/integrity` package did not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade. Users unable to upgrade may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure.

Risk And Classification

Problem Types: CWE-327

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Sylabs Singularity Image Format All All All All

References

ReferenceSourceLinkTags
Apptainer: Lack of Digital Signature Hash Verification (GLSA 202210-19) — Gentoo security GENTOO security.gentoo.org
Merge pull request from GHSA-m5m3-46gj-wch8 · sylabs/sif@07fb860 · GitHub MISC github.com
cve-website MISC www.cve.org
Digital Signature Hash Algorithms Not Validated · Advisory · sylabs/sif · GitHub CONFIRM github.com
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 182404 Debian Security Update for golang-github-sylabs-sif (CVE-2022-39237)
  • 505982 Alpine Linux Security Update for apptainer
  • 710667 Gentoo Linux Apptainer Lack of Digital Signature Hash Verification Vulnerability (GLSA 202210-19)
  • 753532 OpenSUSE Security Update for apptainer (openSUSE-SU-2023:0018-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report