Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/singularity@3.6.4-r0?arch=ppc64le&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namesingularity
Version3.6.4-r0
Qualifiers
arch ppc64le
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.7.3-r0
Latest_non_vulnerable_version4.3.5-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-qz7w-3qvp-ykan
vulnerability_id VCID-qz7w-3qvp-ykan
summary
Path traversal and files overwrite with unsquashfs in singularity
### Impact

Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs` (a distribution provided utility used by Singularity), it is possible to overwrite/create any files on the host filesystem during the extraction of a crafted squashfs filesystem.

Squashfs extraction occurs automatically for unprivileged execution of Singularity (either `--without-suid` installation or with `allow setuid = no`) when a user attempts to run an image which:

- is a local SIF image or a single file containing a squashfs filesystem
- is pulled from remote sources `library://` or `shub://`

Image build is also impacted in a more serious way as it is often performed by the root user, allowing an attacker to overwrite/create files leading to a system compromise.  Bootstrap methods `library`, `shub` and `localimage` trigger a squashfs extraction.

### Patches

This issue is addressed in Singularity 3.6.4.

All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user.

### Workarounds

There is no solid workaround except to temporarily avoid use of unprivileged mode with single file images, in favor of sandbox images instead. Regarding image build, temporarily avoid building from `library` and `shub` sources, and as much as possible use `--fakeroot` or a VM to limit potential impact.

### For more information

General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:

* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)

Any sensitive security concerns should be directed to: security@sylabs.io

See our Security Policy here: https://sylabs.io/security-policy
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15229
reference_id
reference_type
scores
0
value 0.00876
scoring_system epss
scoring_elements 0.75368
published_at 2026-04-24T12:55:00Z
1
value 0.00876
scoring_system epss
scoring_elements 0.75278
published_at 2026-04-04T12:55:00Z
2
value 0.00876
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-07T12:55:00Z
3
value 0.00876
scoring_system epss
scoring_elements 0.75298
published_at 2026-04-08T12:55:00Z
4
value 0.00876
scoring_system epss
scoring_elements 0.75309
published_at 2026-04-09T12:55:00Z
5
value 0.00876
scoring_system epss
scoring_elements 0.7533
published_at 2026-04-11T12:55:00Z
6
value 0.00876
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-12T12:55:00Z
7
value 0.00876
scoring_system epss
scoring_elements 0.75297
published_at 2026-04-13T12:55:00Z
8
value 0.00876
scoring_system epss
scoring_elements 0.75336
published_at 2026-04-16T12:55:00Z
9
value 0.00876
scoring_system epss
scoring_elements 0.75343
published_at 2026-04-18T12:55:00Z
10
value 0.00876
scoring_system epss
scoring_elements 0.75333
published_at 2026-04-21T12:55:00Z
11
value 0.00876
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-01T12:55:00Z
12
value 0.00876
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15229
4
reference_url https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes
5
reference_url https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e
6
reference_url https://github.com/hpcng/singularity/pull/5611
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hpcng/singularity/pull/5611
7
reference_url https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15229
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15229
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972212
reference_id 972212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972212
fixed_packages
0
url pkg:apk/alpine/singularity@3.6.4-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/singularity@3.6.4-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/singularity@3.6.4-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2020-15229, GHSA-7gcp-w6ww-2xv9
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz7w-3qvp-ykan
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/singularity@3.6.4-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community