8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
16.7%
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
access.redhat.com/errata/RHSA-2024:2049
access.redhat.com/errata/RHSA-2024:2055
access.redhat.com/errata/RHSA-2024:2064
access.redhat.com/errata/RHSA-2024:2066
access.redhat.com/errata/RHSA-2024:2077
access.redhat.com/errata/RHSA-2024:2084
access.redhat.com/errata/RHSA-2024:2089
access.redhat.com/errata/RHSA-2024:2090
access.redhat.com/errata/RHSA-2024:2097
access.redhat.com/errata/RHSA-2024:2098
access.redhat.com/errata/RHSA-2024:2548
access.redhat.com/errata/RHSA-2024:2645
access.redhat.com/errata/RHSA-2024:2669
access.redhat.com/errata/RHSA-2024:2672
access.redhat.com/errata/RHSA-2024:2784
access.redhat.com/errata/RHSA-2024:2877
access.redhat.com/errata/RHSA-2024:3254
access.redhat.com/security/cve/CVE-2024-1753
bugzilla.redhat.com/show_bug.cgi?id=2265513
github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
lists.fedoraproject.org/archives/list/[email protected]/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
lists.fedoraproject.org/archives/list/[email protected]/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
lists.fedoraproject.org/archives/list/[email protected]/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.6 High
AI Score
Confidence
Low
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
16.7%