This repository has been archived by the owner on Jan 4, 2025. It is now read-only.
chore(deps): update module github.com/containers/podman/v4 to v4.9.4 [security] - autoclosed #70
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v4.9.3
->v4.9.4
GitHub Vulnerability Alerts
CVE-2024-1753
Impact
What kind of vulnerability is it? Who is impacted?
Users running containers with root privileges allowing a container to run with read/write access to the host system files when selinux is not enabled. With selinux enabled, some read access is allowed.
Patches
From @nalind . This is a patch for Buildah (https://github.com/containers/buildah). Once fixed there, Buildah will be vendored into Podman.
Reproducer
Prior to testing, as root, add a memorable username to
/etc/passwd
via adduser or your favorite editor. Also create a memorably named file in/
. Suggest:touch /SHOULDNTSEETHIS.txt
andadduser SHOULDNTSEETHIS
. After testing, remember to remove both the file and the user from your system.Use the following Containerfile
To Test
Testing with an older version of Podman with the issue
As part of the printout from the build, you should be able to see the contents of the
/' and
/etcdirectories, including the
/SHOULDNOTSEETHIS.txtfile that you created, and the contents of the
/etc/passwdfile which will include the
SHOULDNOTSEETHISuser that you created. In addition, the file
/BIND_BREAKOUTand
/etc/BIND_BREAKOUT2` will exist on the host after the command is completed. Be sure to remove those two files between tests.Neither the
/BIND_BREAKEOUT
or/etc/BIND_BREAKOUT2
files should be created. An error should be raised during the build when both files are trying to be created. Also, errors will be raised when the build tries to display the contents of the/etc/passwd
file, and nothing will be displayed from that file.However, the files in both the
/
and/etc
directories on the host system will be displayed.Testing with the patch
Use the same commands as testing with an older version of Podman.
When running using the patched version of Podman, regardless of the
setenforce
settings, you should not see the file that you created or the user that you added. Also the/BIND_BREAKOUT
and the/etc/BIND_BREAKOUT
will not exist on the host after the test completes.NOTE: With the fix, the contents of the
/
and/etc
directories, and the/etc/passwd
file will be displayed, however, it will be the file and contents from the container image, and NOT the host system. Also the/BIND_BREAKOUT
and/etc/BIND_BREAKOUT
files will be created in the container image.Workarounds
Ensure selinux controls are in place to avoid compromising sensitive system files and systems. With "setenforce 0" set, which is not at all advised, the root file system is open for modification with this exploit. With "setenfoce 1" set, which is the recommendation, files can not be changed. However, the contents of the
/
directory can be displayed. I.e.,ls -alF /
will show the contents of the host directory.References
Unknown.
Release Notes
containers/podman (github.com/containers/podman/v4)
v4.9.4
Compare Source
Security
podman build
which allowed a user to write files to the/
directory of the host machine if selinux was not enabled.Bugfixes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.