Vulnerability Description
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lfprojects | Apptainer | 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/apptainer/apptainer/pull/1523Patch
- https://github.com/apptainer/apptainer/pull/1578Patch
- https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvxPatchVendor Advisory
- https://github.com/apptainer/apptainer/pull/1523Patch
- https://github.com/apptainer/apptainer/pull/1578Patch
- https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvxPatchVendor Advisory
FAQ
What is CVE-2023-38496?
CVE-2023-38496 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root...
How severe is CVE-2023-38496?
CVE-2023-38496 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38496?
Check the references section above for vendor advisories and patch information. Affected products include: Lfprojects Apptainer.