A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a RUN
instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.39.3+ds1-1syncable1", "binary_name": "buildah" }, { "binary_version": "1.39.3+ds1-1syncable1", "binary_name": "buildah-dbgsym" }, { "binary_version": "1.39.3+ds1-1syncable1", "binary_name": "golang-github-containers-buildah-dev" } ] }