You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/apptainer/apptainer
vulnerable_at: 1.2.1
packages:
- package: apptainer
description: |-
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an
ineffective privilege drop when requesting container network setup, therefore
subsequent functions are called with root privileges, the attack surface is
rather limited for users but an attacker could possibly craft a starter config
to delete any directory on the host filesystems. A security fix has been
included in Apptainer 1.2.1. There is no known workaround outside of upgrading
to Apptainer 1.2.1.
cves:
- CVE-2023-38496
references:
- advisory: https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx
- fix: https://github.com/apptainer/apptainer/pull/1523
- fix: https://github.com/apptainer/apptainer/pull/1578
The text was updated successfully, but these errors were encountered:
CVE-2023-38496 references github.com/apptainer/apptainer, which may be a Go module.
Description:
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: