From e8795f2985fca52ab95f7e5c0acd93daef2b8bfe Mon Sep 17 00:00:00 2001 From: Tim King Date: Wed, 20 Mar 2024 00:01:16 +0000 Subject: [PATCH] data/reports: add GO-2024-2658.yaml Aliases: CVE-2024-1753, GHSA-pmf3-c36m-g5cf Fixes golang/vulndb#2658 Change-Id: Ia8ce6b15935634e563427fa69f8f99d2316ff54e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/572935 TryBot-Result: Gopher Robot Reviewed-by: Maceo Thompson Run-TryBot: Tim King LUCI-TryBot-Result: Go LUCI --- data/osv/GO-2024-2658.json | 62 ++++++++++++++++++++++++++++++++++ data/reports/GO-2024-2658.yaml | 27 +++++++++++++++ 2 files changed, 89 insertions(+) create mode 100644 data/osv/GO-2024-2658.json create mode 100644 data/reports/GO-2024-2658.yaml diff --git a/data/osv/GO-2024-2658.json b/data/osv/GO-2024-2658.json new file mode 100644 index 00000000..f3bb1c49 --- /dev/null +++ b/data/osv/GO-2024-2658.json @@ -0,0 +1,62 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2024-2658", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2024-1753", + "GHSA-pmf3-c36m-g5cf" + ], + "summary": "Container escape at build time in github.com/containers/buildah", + "details": "A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem.", + "affected": [ + { + "package": { + "name": "github.com/containers/buildah", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.35.1" + } + ] + } + ], + "ecosystem_specific": { + "imports": [ + { + "path": "github.com/containers/buildah/internal/volumes", + "symbols": [ + "GetBindMount", + "GetVolumes" + ] + } + ] + } + } + ], + "references": [ + { + "type": "FIX", + "url": "https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5" + }, + { + "type": "REPORT", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513" + } + ], + "credits": [ + { + "name": "@rmcnamara-snyk" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2024-2658" + } +} \ No newline at end of file diff --git a/data/reports/GO-2024-2658.yaml b/data/reports/GO-2024-2658.yaml new file mode 100644 index 00000000..5561f799 --- /dev/null +++ b/data/reports/GO-2024-2658.yaml @@ -0,0 +1,27 @@ +id: GO-2024-2658 +modules: + - module: github.com/containers/buildah + versions: + - fixed: 1.35.1 + vulnerable_at: 1.35.0 + packages: + - package: github.com/containers/buildah/internal/volumes + symbols: + - GetBindMount + derived_symbols: + - GetVolumes +summary: Container escape at build time in github.com/containers/buildah +description: |- + A crafted container file can use a dummy image with a symbolic link to the host + filesystem as a mount source and cause the mount operation to mount the host + filesystem during a build-time RUN step. The commands inside the RUN step + will then have read-write access to the host filesystem. +cves: + - CVE-2024-1753 +ghsas: + - GHSA-pmf3-c36m-g5cf +credits: + - '@rmcnamara-snyk' +references: + - fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5 + - report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513