Логотип exploitDog
bind:"CVE-2024-9676" OR bind:"CVE-2024-9407" OR bind:"CVE-2024-9675"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-9676" OR bind:"CVE-2024-9407" OR bind:"CVE-2024-9675"

Количество 49

Количество 49

redos логотип

ROS-20241029-03

около 1 года назад

Уязвимость podman

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-wq2p-5pc6-wpgf

около 1 года назад

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-09457

около 1 года назад

Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с неправильным ограничением имени пути к ограниченному каталогу, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2024:10289

12 месяцев назад

Moderate: container-tools:rhel8 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-10289

около 1 года назад

ELSA-2024-10289: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-9675

около 1 года назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-9675

около 1 года назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2024-9675

около 1 года назад

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2024-9675

3 месяца назад

Buildah: buildah allows arbitrary directory mount

EPSS: Низкий
debian логотип

CVE-2024-9675

около 1 года назад

A vulnerability was found in Buildah. Cache mounts do not properly val ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2024-9407

около 1 года назад

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2024-9407

около 1 года назад

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2024-9407

около 1 года назад

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
EPSS: Низкий
msrc логотип

CVE-2024-9407

3 месяца назад

Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction

EPSS: Низкий
debian логотип

CVE-2024-9407

около 1 года назад

A vulnerability exists in the bind-propagation option of the Dockerfil ...

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3728-1

около 1 года назад

Security update for buildah

EPSS: Низкий
redos логотип

ROS-20241029-07

около 1 года назад

Уязвимость buildah

CVSS3: 4.4
EPSS: Низкий
rocky логотип

RLSA-2024:8563

около 1 года назад

Important: buildah security update

EPSS: Низкий
github логотип

GHSA-586p-749j-fhwp

около 1 года назад

Buildah allows arbitrary directory mount

CVSS3: 4.4
EPSS: Низкий
oracle-oval логотип

ELSA-2024-8563

около 1 года назад

ELSA-2024-8563: buildah security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20241029-03

Уязвимость podman

CVSS3: 6.5
1%
Низкий
около 1 года назад
github логотип
GHSA-wq2p-5pc6-wpgf

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

CVSS3: 6.5
1%
Низкий
около 1 года назад
fstec логотип
BDU:2024-09457

Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с неправильным ограничением имени пути к ограниченному каталогу, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
1%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:10289

Moderate: container-tools:rhel8 security update

12 месяцев назад
oracle-oval логотип
ELSA-2024-10289

ELSA-2024-10289: container-tools:ol8 security update (MODERATE)

около 1 года назад
ubuntu логотип
CVE-2024-9675

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-9675

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-9675

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS3: 7.8
0%
Низкий
около 1 года назад
msrc логотип
CVE-2024-9675

Buildah: buildah allows arbitrary directory mount

0%
Низкий
3 месяца назад
debian логотип
CVE-2024-9675

A vulnerability was found in Buildah. Cache mounts do not properly val ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-9407

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-9407

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-9407

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVSS3: 4.7
0%
Низкий
около 1 года назад
msrc логотип
CVE-2024-9407

Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction

0%
Низкий
3 месяца назад
debian логотип
CVE-2024-9407

A vulnerability exists in the bind-propagation option of the Dockerfil ...

CVSS3: 4.7
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3728-1

Security update for buildah

0%
Низкий
около 1 года назад
redos логотип
ROS-20241029-07

Уязвимость buildah

CVSS3: 4.4
0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:8563

Important: buildah security update

0%
Низкий
около 1 года назад
github логотип
GHSA-586p-749j-fhwp

Buildah allows arbitrary directory mount

CVSS3: 4.4
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-8563

ELSA-2024-8563: buildah security update (IMPORTANT)

около 1 года назад

Уязвимостей на страницу