CVE-2023-38496
Summary
| CVE | CVE-2023-38496 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-25 22:15:00 UTC |
| Updated | 2023-08-02 19:32:00 UTC |
| Description | Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Lfprojects | Apptainer | 1.2.0 | - | All | All |
| Application | Lfprojects | Apptainer | 1.2.0 | rc2 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Set real UID to zero when escalating privileges for CNI plugins to fix issue appeared with RHEL 9.X (release 1.2) by cclerget · Pull Request #1523 · apptainer/apptainer · GitHub | MISC | github.com | |
| Restore old syscall setresuid behavior when escalating/dropping privileges. by cclerget · Pull Request #1578 · apptainer/apptainer · GitHub | MISC | github.com | |
| Ineffective privileges drop when requesting container network · Advisory · apptainer/apptainer · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.