Use-after-free in Apptainer - CVE-2023-30549
Published: August 21, 2023
Vulnerability identifier: #VU79800
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-30549
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Apptainer
Apptainer
Software vendor:
The Apptainer Container Project
The Apptainer Container Project
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in ext4 support. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.
External links
- https://access.redhat.com/security/cve/cve-2022-1184
- https://www.suse.com/security/cve/CVE-2022-1184.html
- https://ubuntu.com/security/CVE-2022-1184
- https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg
- https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7
- https://security-tracker.debian.org/tracker/CVE-2022-1184
- https://github.com/apptainer/apptainer/releases/tag/v1.1.8
- https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f
- https://lwn.net/Articles/932136/
- https://lwn.net/Articles/932137/
- https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303
- https://sylabs.io/2023/04/response-to-cve-2023-30549/