Skip to content

Commit e8795f2

Browse files
committed
data/reports: add GO-2024-2658.yaml
Aliases: CVE-2024-1753, GHSA-pmf3-c36m-g5cf Fixes #2658 Change-Id: Ia8ce6b15935634e563427fa69f8f99d2316ff54e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/572935 TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Maceo Thompson <[email protected]> Run-TryBot: Tim King <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent cd9ae5e commit e8795f2

File tree

2 files changed

+89
-0
lines changed

2 files changed

+89
-0
lines changed

data/osv/GO-2024-2658.json

+62
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2658",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-1753",
8+
"GHSA-pmf3-c36m-g5cf"
9+
],
10+
"summary": "Container escape at build time in github.com/containers/buildah",
11+
"details": "A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/containers/buildah",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.35.1"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/containers/buildah/internal/volumes",
35+
"symbols": [
36+
"GetBindMount",
37+
"GetVolumes"
38+
]
39+
}
40+
]
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "FIX",
47+
"url": "https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5"
48+
},
49+
{
50+
"type": "REPORT",
51+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
52+
}
53+
],
54+
"credits": [
55+
{
56+
"name": "@rmcnamara-snyk"
57+
}
58+
],
59+
"database_specific": {
60+
"url": "https://pkg.go.dev/vuln/GO-2024-2658"
61+
}
62+
}

data/reports/GO-2024-2658.yaml

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: GO-2024-2658
2+
modules:
3+
- module: github.com/containers/buildah
4+
versions:
5+
- fixed: 1.35.1
6+
vulnerable_at: 1.35.0
7+
packages:
8+
- package: github.com/containers/buildah/internal/volumes
9+
symbols:
10+
- GetBindMount
11+
derived_symbols:
12+
- GetVolumes
13+
summary: Container escape at build time in github.com/containers/buildah
14+
description: |-
15+
A crafted container file can use a dummy image with a symbolic link to the host
16+
filesystem as a mount source and cause the mount operation to mount the host
17+
filesystem during a build-time RUN step. The commands inside the RUN step
18+
will then have read-write access to the host filesystem.
19+
cves:
20+
- CVE-2024-1753
21+
ghsas:
22+
- GHSA-pmf3-c36m-g5cf
23+
credits:
24+
- '@rmcnamara-snyk'
25+
references:
26+
- fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5
27+
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513

0 commit comments

Comments
 (0)