{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T06:40:08.096","vulnerabilities":[{"cve":{"id":"CVE-2026-24843","sourceIdentifier":"security-advisories@github.com","published":"2026-02-04T20:16:05.393","lastModified":"2026-02-18T15:57:38.797","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"melange allows users to build apk packages using declarative pipelines. In version 0.11.3 to before 0.40.3, an attacker who can influence the tar stream from a QEMU guest VM could write files outside the intended workspace directory on the host. The retrieveWorkspace function extracts tar entries without validating that paths stay within the workspace, allowing path traversal via ../ sequences. This issue has been patched in version 0.40.3."},{"lang":"es","value":"melange permite a los usuarios construir paquetes apk utilizando pipelines declarativos. En las versiones 0.11.3 hasta antes de la 0.40.3, un atacante que puede influir en el flujo tar desde una VM invitada de QEMU podría escribir archivos fuera del directorio de espacio de trabajo previsto en el host. La función retrieveWorkspace extrae entradas tar sin validar que las rutas permanezcan dentro del espacio de trabajo, permitiendo el salto de ruta a través de secuencias ../. Este problema ha sido parcheado en la versión 0.40.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":5.8}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:chainguard:melange:*:*:*:*:*:go:*:*","versionStartIncluding":"0.11.3","versionEndExcluding":"0.40.5","matchCriteriaId":"56496C74-AC93-4A3A-AF6B-DCA473D83792"}]}]}],"references":[{"url":"https://github.com/chainguard-dev/melange/commit/6e243d0d46699f837d7c392397a694d2bcc7612b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/chainguard-dev/melange/security/advisories/GHSA-qxx2-7h4c-83f4","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}