Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x6ph-r535-3vjw

Опубликовано: 18 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7

Описание

apko is vulnerable to attack through incorrect permissions in /etc/ld.so.cache and other files

It was discovered that the ld.so.cache in images generated by apko had file system permissions mode 0666:

bash-5.3# find / -type f -perm -o+w /etc/ld.so.cache

This issue was introduced in commit 04f37e2 ("generate /etc/ld.so.cache (#1629)")(v0.27.0).

Impact

This potentially allows a local unprivileged user to add additional additional directories including dynamic libraries to the dynamic loader path. A user could exploit this by placing a malicious library in a directory they control.

Patches

This issue was addressed in apko in aedb077 ("fix: /etc/ld.so.cache file permissions (#1758)") (v0.29.5).

Acknowledgements

Many thanks to Cody Harris from H2O.ai for reporting this issue.

Пакеты

Наименование

chainguard.dev/apko

go
Затронутые версииВерсия исправления

>= 0.27.0, < 0.29.5

0.29.5

EPSS

Процентиль: 3%
0.00017
Низкий

7 High

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 7
nvd
7 месяцев назад

apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.

EPSS

Процентиль: 3%
0.00017
Низкий

7 High

CVSS3

Дефекты

CWE-276