Source: golang-github-containers-buildah
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for 
golang-github-containers-buildah.

CVE-2024-9407[0]:
| A vulnerability exists in the bind-propagation option of the
| Dockerfile RUN --mount instruction. The system does not properly
| validate the input passed to this option, allowing users to pass
| arbitrary parameters to the mount instruction. This issue can be
| exploited to mount sensitive directories from the host into a
| container during the build process and, in some cases, modify the
| contents of those mounted files. Even if SELinux is used, this
| vulnerability can bypass its protection by allowing the source
| directory to be relabeled to give the container access to host
| files.

https://bugzilla.redhat.com/show_bug.cgi?id=2315887

CVE-2024-9675[1]:
| A vulnerability was found in Buildah. Cache mounts do not properly
| validate that user-specified paths for the cache are within our
| cache directory, allowing a `RUN` instruction in a Container file to
| mount an arbitrary directory from the host (read/write) into the
| container as long as those files can be accessed by the user running
| Buildah.

https://bugzilla.redhat.com/show_bug.cgi?id=2317458

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-9407
    https://www.cve.org/CVERecord?id=CVE-2024-9407
[1] https://security-tracker.debian.org/tracker/CVE-2024-9675
    https://www.cve.org/CVERecord?id=CVE-2024-9675

Please adjust the affected versions in the BTS as needed.

Reply via email to