CVE-2024-1753

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
References
Link Resource
https://access.redhat.com/errata/RHSA-2024:2049
https://access.redhat.com/errata/RHSA-2024:2055
https://access.redhat.com/errata/RHSA-2024:2064
https://access.redhat.com/errata/RHSA-2024:2066
https://access.redhat.com/errata/RHSA-2024:2077
https://access.redhat.com/errata/RHSA-2024:2084
https://access.redhat.com/errata/RHSA-2024:2089
https://access.redhat.com/errata/RHSA-2024:2090
https://access.redhat.com/errata/RHSA-2024:2097
https://access.redhat.com/errata/RHSA-2024:2098
https://access.redhat.com/errata/RHSA-2024:2548
https://access.redhat.com/errata/RHSA-2024:2645
https://access.redhat.com/errata/RHSA-2024:2669
https://access.redhat.com/errata/RHSA-2024:2672
https://access.redhat.com/errata/RHSA-2024:2784
https://access.redhat.com/errata/RHSA-2024:2877
https://access.redhat.com/errata/RHSA-2024:3254
https://access.redhat.com/security/cve/CVE-2024-1753
https://bugzilla.redhat.com/show_bug.cgi?id=2265513
https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
https://pkg.go.dev/vuln/GO-2024-2658
https://access.redhat.com/errata/RHSA-2024:2049
https://access.redhat.com/errata/RHSA-2024:2055
https://access.redhat.com/errata/RHSA-2024:2064
https://access.redhat.com/errata/RHSA-2024:2066
https://access.redhat.com/errata/RHSA-2024:2077
https://access.redhat.com/errata/RHSA-2024:2084
https://access.redhat.com/errata/RHSA-2024:2089
https://access.redhat.com/errata/RHSA-2024:2090
https://access.redhat.com/errata/RHSA-2024:2097
https://access.redhat.com/errata/RHSA-2024:2098
https://access.redhat.com/errata/RHSA-2024:2548
https://access.redhat.com/errata/RHSA-2024:2645
https://access.redhat.com/errata/RHSA-2024:2669
https://access.redhat.com/errata/RHSA-2024:2672
https://access.redhat.com/errata/RHSA-2024:2784
https://access.redhat.com/errata/RHSA-2024:2877
https://access.redhat.com/errata/RHSA-2024:3254
https://access.redhat.com/security/cve/CVE-2024-1753
https://bugzilla.redhat.com/show_bug.cgi?id=2265513
https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
Configurations

No configuration.

History

26 Nov 2024, 20:15

Type Values Removed Values Added
References
  • () https://pkg.go.dev/vuln/GO-2024-2658 -
References
  • () https://pkg.go.dev/vuln/GO-2024-2658 -

24 Nov 2024, 14:15

Type Values Removed Values Added
CWE CWE-269 CWE-59

21 Nov 2024, 08:51

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/ -
References () https://access.redhat.com/errata/RHSA-2024:2049 - () https://access.redhat.com/errata/RHSA-2024:2049 -
References () https://access.redhat.com/errata/RHSA-2024:2055 - () https://access.redhat.com/errata/RHSA-2024:2055 -
References () https://access.redhat.com/errata/RHSA-2024:2064 - () https://access.redhat.com/errata/RHSA-2024:2064 -
References () https://access.redhat.com/errata/RHSA-2024:2066 - () https://access.redhat.com/errata/RHSA-2024:2066 -
References () https://access.redhat.com/errata/RHSA-2024:2077 - () https://access.redhat.com/errata/RHSA-2024:2077 -
References () https://access.redhat.com/errata/RHSA-2024:2084 - () https://access.redhat.com/errata/RHSA-2024:2084 -
References () https://access.redhat.com/errata/RHSA-2024:2089 - () https://access.redhat.com/errata/RHSA-2024:2089 -
References () https://access.redhat.com/errata/RHSA-2024:2090 - () https://access.redhat.com/errata/RHSA-2024:2090 -
References () https://access.redhat.com/errata/RHSA-2024:2097 - () https://access.redhat.com/errata/RHSA-2024:2097 -
References () https://access.redhat.com/errata/RHSA-2024:2098 - () https://access.redhat.com/errata/RHSA-2024:2098 -
References () https://access.redhat.com/errata/RHSA-2024:2548 - () https://access.redhat.com/errata/RHSA-2024:2548 -
References () https://access.redhat.com/errata/RHSA-2024:2645 - () https://access.redhat.com/errata/RHSA-2024:2645 -
References () https://access.redhat.com/errata/RHSA-2024:2669 - () https://access.redhat.com/errata/RHSA-2024:2669 -
References () https://access.redhat.com/errata/RHSA-2024:2672 - () https://access.redhat.com/errata/RHSA-2024:2672 -
References () https://access.redhat.com/errata/RHSA-2024:2784 - () https://access.redhat.com/errata/RHSA-2024:2784 -
References () https://access.redhat.com/errata/RHSA-2024:2877 - () https://access.redhat.com/errata/RHSA-2024:2877 -
References () https://access.redhat.com/errata/RHSA-2024:3254 - () https://access.redhat.com/errata/RHSA-2024:3254 -
References () https://access.redhat.com/security/cve/CVE-2024-1753 - () https://access.redhat.com/security/cve/CVE-2024-1753 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2265513 - () https://bugzilla.redhat.com/show_bug.cgi?id=2265513 -
References () https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf - () https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf -
References () https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3 - () https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3 -

16 Sep 2024, 19:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/', 'source': 'secalert@redhat.com'}

24 May 2024, 00:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2877 -

22 May 2024, 17:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3254 -

16 May 2024, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2784 -

09 May 2024, 22:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2672 -

09 May 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2669 -

08 May 2024, 02:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2049 -

01 May 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2645 -

01 May 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2089 -
  • () https://access.redhat.com/errata/RHSA-2024:2090 -

30 Apr 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2548 -

29 Apr 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2084 -

29 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2077 -
  • () https://access.redhat.com/errata/RHSA-2024:2097 -
  • () https://access.redhat.com/errata/RHSA-2024:2098 -

26 Apr 2024, 08:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2055 -
  • () https://access.redhat.com/errata/RHSA-2024:2064 -
  • () https://access.redhat.com/errata/RHSA-2024:2066 -

03 Apr 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/ -

27 Mar 2024, 01:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/ -

18 Mar 2024, 17:15

Type Values Removed Values Added
Summary A flaw was found in Podman Build and Buildah which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time. A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

18 Mar 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 15:15

Updated : 2024-11-26 20:15


NVD link : CVE-2024-1753

Mitre link : CVE-2024-1753

CVE.ORG link : CVE-2024-1753


JSON object : View

Products Affected

No product.

CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')