A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
04 Dec 2024, 17:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Arm 64 Redhat enterprise Linux Server Tus Redhat enterprise Linux Update Services For Sap Solutions Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Redhat enterprise Linux Server Aus Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux For Arm 64 Eus Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux Eus Buildah Project Redhat enterprise Linux Redhat openshift Container Platform Buildah Project buildah |
|
CPE | cpe:2.3:a:buildah_project:buildah:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.8_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:* |
|
References | () https://access.redhat.com/errata/RHSA-2024:8563 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8675 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8679 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8686 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8690 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8700 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8703 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8707 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8708 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8709 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8846 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8984 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8994 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9051 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9454 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9459 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-9675 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2317458 - Issue Tracking |
21 Nov 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 15:15
Updated : 2024-12-13 18:15
NVD link : CVE-2024-9675
Mitre link : CVE-2024-9675
CVE.ORG link : CVE-2024-9675
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_update_services_for_sap_solutions
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_arm_64_eus
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_for_power_little_endian
- openshift_container_platform
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_eus
- enterprise_linux_for_arm_64
buildah_project
- buildah
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')