Bug 2226582 (CVE-2023-38496)

Summary: CVE-2023-38496 apptainer: Ineffective privileges drop when requesting container network
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-08-01 13:13:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2224098, 2226583, 2226584    
Bug Blocks:    

Description Sandipan Roy 2023-07-26 03:31:55 UTC
Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.

https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx
https://github.com/apptainer/apptainer/pull/1523
https://github.com/apptainer/apptainer/pull/1578

Comment 1 Sandipan Roy 2023-07-26 03:32:11 UTC
Created apptainer tracking bugs for this issue:

Affects: epel-all [bug 2226583]
Affects: fedora-all [bug 2226584]

Comment 2 Product Security DevOps Team 2023-08-01 13:13:54 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.