CVE-2024-9675
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
09/10/2024
Last modified:
25/08/2025
Description
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:buildah_project:buildah:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:8563
- https://access.redhat.com/errata/RHSA-2024:8675
- https://access.redhat.com/errata/RHSA-2024:8679
- https://access.redhat.com/errata/RHSA-2024:8686
- https://access.redhat.com/errata/RHSA-2024:8690
- https://access.redhat.com/errata/RHSA-2024:8700
- https://access.redhat.com/errata/RHSA-2024:8703
- https://access.redhat.com/errata/RHSA-2024:8707
- https://access.redhat.com/errata/RHSA-2024:8708
- https://access.redhat.com/errata/RHSA-2024:8709
- https://access.redhat.com/errata/RHSA-2024:8846
- https://access.redhat.com/errata/RHSA-2024:8984
- https://access.redhat.com/errata/RHSA-2024:8994
- https://access.redhat.com/errata/RHSA-2024:9051
- https://access.redhat.com/errata/RHSA-2024:9454
- https://access.redhat.com/errata/RHSA-2024:9459
- https://access.redhat.com/errata/RHSA-2025:2445
- https://access.redhat.com/errata/RHSA-2025:2449
- https://access.redhat.com/errata/RHSA-2025:2454
- https://access.redhat.com/errata/RHSA-2025:2701
- https://access.redhat.com/errata/RHSA-2025:2710
- https://access.redhat.com/errata/RHSA-2025:3301
- https://access.redhat.com/errata/RHSA-2025:3573
- https://access.redhat.com/security/cve/CVE-2024-9675
- https://bugzilla.redhat.com/show_bug.cgi?id=2317458



