Informazioni sul CVE-2024-9676
Podman: buildah: cri-o: symlink traversal vulnerability in the containers/storage library can cause denial of service (dos)
CWE ID: CWE-22
Base Score (CVSS): N/A
CVE: CVE-2024-9676
Descrizione: A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`–userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
Vettore di attacco CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Riassunto: Accesso: Network, Privilegi: Low, Interazione utente: None, Confidenzialità: None, Integrità: None, Disponibilità: High.
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|---|---|---|
Attack Vector (AV) | N | Network | L’attacco può essere eseguito da remoto attraverso la rete. |
Attack Complexity (AC) | L | Low | L’attacco non richiede condizioni particolari. |
Privileges Required (PR) | L | Low | Richiede pochi privilegi. |
User Interaction (UI) | N | None | Non è richiesta interazione dell’utente. |
Scope (S) | U | Unchanged | Il raggio d’azione non cambia. |
Confidentiality Impact (C) | N | None | Nessun impatto sulla riservatezza. |
Integrity Impact (I) | N | None | Nessun impatto sull’integrità. |
Availability Impact (A) | H | High | Rende il sistema inutilizzabile. |
Riferimenti esterni
- https://access.redhat.com/errata/RHSA-2024:10289
- https://access.redhat.com/errata/RHSA-2024:8418
- https://access.redhat.com/errata/RHSA-2024:8428
- https://access.redhat.com/errata/RHSA-2024:8437
- https://access.redhat.com/errata/RHSA-2024:8686
- https://access.redhat.com/errata/RHSA-2024:8690
- https://access.redhat.com/errata/RHSA-2024:8694
- https://access.redhat.com/errata/RHSA-2024:8700
- https://access.redhat.com/errata/RHSA-2024:8984
- https://access.redhat.com/errata/RHSA-2024:9051
- https://access.redhat.com/errata/RHSA-2024:9454
- https://access.redhat.com/errata/RHSA-2024:9459
- https://access.redhat.com/errata/RHSA-2024:9926
- https://access.redhat.com/errata/RHSA-2025:0876
- https://access.redhat.com/errata/RHSA-2025:2454
- https://access.redhat.com/errata/RHSA-2025:2710
- https://access.redhat.com/security/cve/CVE-2024-9676
- https://bugzilla.redhat.com/show_bug.cgi?id=2317467
- https://github.com/advisories/GHSA-wq2p-5pc6-wpgf
Prodotti interessati
- Sconosciuto – Sconosciuto
- Red Hat – Red Hat Enterprise Linux 8
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9.4 Extended Update Support
- Red Hat – Red Hat OpenShift Container Platform 4.12
- Red Hat – Red Hat OpenShift Container Platform 4.13
- Red Hat – Red Hat OpenShift Container Platform 4.14
- Red Hat – Red Hat OpenShift Container Platform 4.14
- Red Hat – Red Hat OpenShift Container Platform 4.15
- Red Hat – Red Hat OpenShift Container Platform 4.15
- Red Hat – Red Hat OpenShift Container Platform 4.16
- Red Hat – Red Hat OpenShift Container Platform 4.16
- Red Hat – Red Hat OpenShift Container Platform 4.17
- Red Hat – Red Hat OpenShift Container Platform 4.17
- Red Hat – Red Hat OpenShift Container Platform 4.17
- Red Hat – OpenShift Developer Tools and Services
- Red Hat – OpenShift Developer Tools and Services
- Red Hat – OpenShift Developer Tools and Services
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat OpenShift Container Platform 4
- Red Hat – Red Hat OpenShift Container Platform 4
- Red Hat – Red Hat OpenShift Container Platform 4
- Red Hat – Red Hat Quay 3
Relazioni con altri prodotti
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 9
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.12
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.13
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.14
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Quay 3
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.15
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.16
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 9.4 Extended Update Support
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat OpenShift Container Platform 4.17
Anno: 2024
CWE: CWE-22
CVSS: 0.0
Produttore:Red Hat
Prodotto: OpenShift Developer Tools and Services
Anno: 2024
CWE: CWE-22
CVSS: 0.0