Directory Traversal Affecting container-tools:rhel8/criu package, versions <0:3.15-4.module+el8.8.0+22334+bb93e398


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-CONTAINERTOOLS-8322485
  • published1 Nov 2024
  • disclosed9 Oct 2024

Introduced: 9 Oct 2024

CVE-2024-9675  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade RHEL:8 container-tools:rhel8/criu to version 0:3.15-4.module+el8.8.0+22334+bb93e398 or higher.
This issue was patched in RHSA-2024:8707.

NVD Description

Note: Versions mentioned in the description apply only to the upstream container-tools:rhel8/criu package and not the container-tools:rhel8/criu package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a RUN instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

CVSS Scores

version 3.1