First published: Thu Mar 26 2020(Updated: )
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containers/buildah | <1.14.4 | 1.14.4 |
redhat/buildah | <1.14.5 | 1.14.5 |
redhat/buildah | <0:1.11.6-11.el7_8 | 0:1.11.6-11.el7_8 |
redhat/podman | <0:1.6.4-18.el7_8 | 0:1.6.4-18.el7_8 |
redhat/podman | <0:1.0.2-4.dev.git96ccc2e.rhaos4.1.el8 | 0:1.0.2-4.dev.git96ccc2e.rhaos4.1.el8 |
redhat/podman | <0:1.4.2-6.rhaos4.2.el8 | 0:1.4.2-6.rhaos4.2.el8 |
redhat/podman | <0:1.6.4-10.rhaos4.3.el8 | 0:1.6.4-10.rhaos4.3.el8 |
Buildah Project Buildah | <1.14.5 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-10696 is a path traversal vulnerability found in Buildah.
CVE-2020-10696 allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
CVE-2020-10696 has a severity level of 8.8 (high).
Versions of Buildah before 1.14.5 are affected by CVE-2020-10696.
To fix CVE-2020-10696 in Buildah, update to version 1.14.5 or later.