-
Notifications
You must be signed in to change notification settings - Fork 64
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2024-1753, GHSA-pmf3-c36m-g5cf Fixes #2658 Change-Id: Ia8ce6b15935634e563427fa69f8f99d2316ff54e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/572935 TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Maceo Thompson <maceothompson@google.com> Run-TryBot: Tim King <taking@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
- Loading branch information
1 parent
cd9ae5e
commit e8795f2
Showing
2 changed files
with
89 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2024-2658", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2024-1753", | ||
"GHSA-pmf3-c36m-g5cf" | ||
], | ||
"summary": "Container escape at build time in github.com/containers/buildah", | ||
"details": "A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/containers/buildah", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.35.1" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/containers/buildah/internal/volumes", | ||
"symbols": [ | ||
"GetBindMount", | ||
"GetVolumes" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5" | ||
}, | ||
{ | ||
"type": "REPORT", | ||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"name": "@rmcnamara-snyk" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2024-2658" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
id: GO-2024-2658 | ||
modules: | ||
- module: github.com/containers/buildah | ||
versions: | ||
- fixed: 1.35.1 | ||
vulnerable_at: 1.35.0 | ||
packages: | ||
- package: github.com/containers/buildah/internal/volumes | ||
symbols: | ||
- GetBindMount | ||
derived_symbols: | ||
- GetVolumes | ||
summary: Container escape at build time in github.com/containers/buildah | ||
description: |- | ||
A crafted container file can use a dummy image with a symbolic link to the host | ||
filesystem as a mount source and cause the mount operation to mount the host | ||
filesystem during a build-time RUN step. The commands inside the RUN step | ||
will then have read-write access to the host filesystem. | ||
cves: | ||
- CVE-2024-1753 | ||
ghsas: | ||
- GHSA-pmf3-c36m-g5cf | ||
credits: | ||
- '@rmcnamara-snyk' | ||
references: | ||
- fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5 | ||
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513 |