Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-9675

Опубликовано: 09 окт. 2024
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-containers-buildahfixed1.37.4+ds1-1package
golang-github-containers-buildahno-dsabookwormpackage
golang-github-containers-buildahpostponedbullseyepackage

Примечания

  • https://github.com/advisories/GHSA-586p-749j-fhwp

  • https://bugzilla.redhat.com/show_bug.cgi?id=2317458

  • https://github.com/containers/buildah/pull/5780

  • Fixed by: https://github.com/containers/buildah/commit/cffa820dc8be07efdb7fc4e8e8b9ff44c70aaf93 (v1.37.5)

EPSS

Процентиль: 21%
0.00066
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
8 месяцев назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
redhat
8 месяцев назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
nvd
8 месяцев назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

suse-cvrf
8 месяцев назад

Security update for buildah

CVSS3: 4.4
redos
8 месяцев назад

Уязвимость buildah

EPSS

Процентиль: 21%
0.00066
Низкий