CVE-2021-3538 (High) detected in github.com/docker/Distribution-v2.7.1+incompatible - autoclosed #65
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-3538 - High Severity Vulnerability
Vulnerable Library - github.com/docker/Distribution-v2.7.1+incompatible
The Docker toolset to pack, ship, store, and deliver content
Library home page: https://proxy.golang.org/github.com/docker/distribution/@v/v2.7.1+incompatible.zip
Dependency Hierarchy:
Found in HEAD commit: ec9d972edb7fb1ea028782bd0f770272d89e0c60
Found in base branch: main
Vulnerability Details
A flaw was found in github.com/satori/go.uuid in versions from commit 0ef6afb2f6cdd6cdaeee3885a95099c63f18fc8c to d91630c8510268e75203009fe7daf2b8e1d60c45. Due to insecure randomness in the g.rand.Read function the generated UUIDs are predictable for an attacker.
Publish Date: 2021-06-02
URL: CVE-2021-3538
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-06-02
Fix Resolution: github.com/satori/go.uuid - 75cca531ea763666bc46e531da3b4c3b95f64557
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: