A flaw was found in Buildah (and subsequently Podman Build) which allows
containers to mount arbitrary locations on the host filesystem into build
containers. A malicious Containerfile can use a dummy image with a symbolic
link to the root filesystem as a mount source and cause the mount operation
to mount the host root filesystem inside the RUN step. The commands inside
the RUN step will then have read-write access to the host filesystem,
allowing for full container escape at build time.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | golang-github-containers-buildah | < any | UNKNOWN |
ubuntu | 23.10 | noarch | golang-github-containers-buildah | < any | UNKNOWN |
ubuntu | 24.04 | noarch | golang-github-containers-buildah | < any | UNKNOWN |
access.redhat.com/security/cve/CVE-2024-1753
bugzilla.redhat.com/show_bug.cgi?id=2265513
github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
launchpad.net/bugs/cve/CVE-2024-1753
nvd.nist.gov/vuln/detail/CVE-2024-1753
security-tracker.debian.org/tracker/CVE-2024-1753
www.cve.org/CVERecord?id=CVE-2024-1753