支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-9675 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Buildah: buildah allows arbitrary directory mount
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
对路径名的限制不恰当(路径遍历)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Buildah 路径遍历漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Buildah是Buildah开源的一款支持构建OCI容器映像的工具。 Buildah存在路径遍历漏洞,该漏洞源于缓存挂载没有正确验证用户指定的缓存路径是否在我们的缓存目录中,允许容器文件中的RUN指令将主机中的任意目录挂载到容器中。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Red HatRed Hat Enterprise Linux 8 8100020241023085649.afee755d ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8060020241028154646.3b538bd8 ~ * cpe:/a:redhat:rhel_aus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 8080020241025064551.0f77c1b7 ~ * cpe:/a:redhat:rhel_eus:8.8::appstream
Red HatRed Hat Enterprise Linux 9 2:1.33.10-1.el9_4 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 4:4.9.4-16.el9_4 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 4:5.2.2-9.el9_5 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 2:1.37.5-1.el9_5 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 1:1.26.8-2.el9_0 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 2:4.2.0-5.el9_0.2 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 1:1.29.4-1.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 2:4.4.1-21.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat OpenShift Container Platform 4.12 v4.12.0-202503181728.p0.ge355452.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.12::el9
Red HatRed Hat OpenShift Container Platform 4.13 3:4.4.1-16.rhaos4.13.el9 ~ * cpe:/a:redhat:openshift:4.13::el8
Red HatRed Hat OpenShift Container Platform 4.13 v4.13.0-202503111300.p0.gb379980.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.13::el8
Red HatRed Hat OpenShift Container Platform 4.14 3:4.4.1-21.rhaos4.14.el9 ~ * cpe:/a:redhat:openshift:4.14::el9
Red HatRed Hat OpenShift Container Platform 4.14 v4.14.0-202503060906.p0.gb03f3f5.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.14::el9
Red HatRed Hat OpenShift Container Platform 4.15 3:4.4.1-32.rhaos4.15.el8 ~ * cpe:/a:redhat:openshift:4.15::el8
Red HatRed Hat OpenShift Container Platform 4.15 v4.15.0-202503060734.p0.gbc0b789.assembly.stream.el8 ~ * cpe:/a:redhat:openshift:4.15::el8
Red HatRed Hat OpenShift Container Platform 4.16 4:4.9.4-12.rhaos4.16.el8 ~ * cpe:/a:redhat:openshift:4.16::el8
Red HatRed Hat OpenShift Container Platform 4.16 v4.16.0-202503121138.p0.g31c3c26.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.16::el9
Red HatRed Hat OpenShift Container Platform 4.17 5:5.2.2-1.rhaos4.17.el8 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift Container Platform 4.17 v4.17.0-202503041005.p0.gc3b0999.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.17::el9
Red HatRed Hat OpenShift Container Platform 4.18 v4.18.0-202503040802.p0.g6a5ec2a.assembly.stream.el9 ~ * cpe:/a:redhat:openshift:4.18::el9
Red HatOpenShift Developer Tools and Services-cpe:/a:redhat:ocp_tools
Red HatOpenShift Developer Tools and Services-cpe:/a:redhat:ocp_tools
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4
Red HatRed Hat Quay 3-cpe:/a:redhat:quay:3
二、漏洞 CVE-2024-9675 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-9675 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2024-9675 的评论

暂无评论


发表评论