CVE-2024-1753

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
References
Link Resource
https://access.redhat.com/errata/RHSA-2024:2049
https://access.redhat.com/errata/RHSA-2024:2055
https://access.redhat.com/errata/RHSA-2024:2064
https://access.redhat.com/errata/RHSA-2024:2066
https://access.redhat.com/errata/RHSA-2024:2077
https://access.redhat.com/errata/RHSA-2024:2084
https://access.redhat.com/errata/RHSA-2024:2089
https://access.redhat.com/errata/RHSA-2024:2090
https://access.redhat.com/errata/RHSA-2024:2097
https://access.redhat.com/errata/RHSA-2024:2098
https://access.redhat.com/errata/RHSA-2024:2548
https://access.redhat.com/errata/RHSA-2024:2645
https://access.redhat.com/errata/RHSA-2024:2669
https://access.redhat.com/errata/RHSA-2024:2672
https://access.redhat.com/errata/RHSA-2024:2784
https://access.redhat.com/errata/RHSA-2024:2877
https://access.redhat.com/errata/RHSA-2024:3254
https://access.redhat.com/security/cve/CVE-2024-1753
https://bugzilla.redhat.com/show_bug.cgi?id=2265513
https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
https://access.redhat.com/errata/RHSA-2024:2049
https://access.redhat.com/errata/RHSA-2024:2055
https://access.redhat.com/errata/RHSA-2024:2064
https://access.redhat.com/errata/RHSA-2024:2066
https://access.redhat.com/errata/RHSA-2024:2077
https://access.redhat.com/errata/RHSA-2024:2084
https://access.redhat.com/errata/RHSA-2024:2089
https://access.redhat.com/errata/RHSA-2024:2090
https://access.redhat.com/errata/RHSA-2024:2097
https://access.redhat.com/errata/RHSA-2024:2098
https://access.redhat.com/errata/RHSA-2024:2548
https://access.redhat.com/errata/RHSA-2024:2645
https://access.redhat.com/errata/RHSA-2024:2669
https://access.redhat.com/errata/RHSA-2024:2672
https://access.redhat.com/errata/RHSA-2024:2784
https://access.redhat.com/errata/RHSA-2024:2877
https://access.redhat.com/errata/RHSA-2024:3254
https://access.redhat.com/security/cve/CVE-2024-1753
https://bugzilla.redhat.com/show_bug.cgi?id=2265513
https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
Configurations

No configuration.

History

21 Nov 2024, 08:51

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/ -
References () https://access.redhat.com/errata/RHSA-2024:2049 - () https://access.redhat.com/errata/RHSA-2024:2049 -
References () https://access.redhat.com/errata/RHSA-2024:2055 - () https://access.redhat.com/errata/RHSA-2024:2055 -
References () https://access.redhat.com/errata/RHSA-2024:2064 - () https://access.redhat.com/errata/RHSA-2024:2064 -
References () https://access.redhat.com/errata/RHSA-2024:2066 - () https://access.redhat.com/errata/RHSA-2024:2066 -
References () https://access.redhat.com/errata/RHSA-2024:2077 - () https://access.redhat.com/errata/RHSA-2024:2077 -
References () https://access.redhat.com/errata/RHSA-2024:2084 - () https://access.redhat.com/errata/RHSA-2024:2084 -
References () https://access.redhat.com/errata/RHSA-2024:2089 - () https://access.redhat.com/errata/RHSA-2024:2089 -
References () https://access.redhat.com/errata/RHSA-2024:2090 - () https://access.redhat.com/errata/RHSA-2024:2090 -
References () https://access.redhat.com/errata/RHSA-2024:2097 - () https://access.redhat.com/errata/RHSA-2024:2097 -
References () https://access.redhat.com/errata/RHSA-2024:2098 - () https://access.redhat.com/errata/RHSA-2024:2098 -
References () https://access.redhat.com/errata/RHSA-2024:2548 - () https://access.redhat.com/errata/RHSA-2024:2548 -
References () https://access.redhat.com/errata/RHSA-2024:2645 - () https://access.redhat.com/errata/RHSA-2024:2645 -
References () https://access.redhat.com/errata/RHSA-2024:2669 - () https://access.redhat.com/errata/RHSA-2024:2669 -
References () https://access.redhat.com/errata/RHSA-2024:2672 - () https://access.redhat.com/errata/RHSA-2024:2672 -
References () https://access.redhat.com/errata/RHSA-2024:2784 - () https://access.redhat.com/errata/RHSA-2024:2784 -
References () https://access.redhat.com/errata/RHSA-2024:2877 - () https://access.redhat.com/errata/RHSA-2024:2877 -
References () https://access.redhat.com/errata/RHSA-2024:3254 - () https://access.redhat.com/errata/RHSA-2024:3254 -
References () https://access.redhat.com/security/cve/CVE-2024-1753 - () https://access.redhat.com/security/cve/CVE-2024-1753 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2265513 - () https://bugzilla.redhat.com/show_bug.cgi?id=2265513 -
References () https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf - () https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf -
References () https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3 - () https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3 -

16 Sep 2024, 19:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/', 'source': 'secalert@redhat.com'}

24 May 2024, 00:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2877 -

22 May 2024, 17:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3254 -

16 May 2024, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2784 -

09 May 2024, 22:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2672 -

09 May 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2669 -

08 May 2024, 02:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2049 -

01 May 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2645 -

01 May 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2089 -
  • () https://access.redhat.com/errata/RHSA-2024:2090 -

30 Apr 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2548 -

29 Apr 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2084 -

29 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2077 -
  • () https://access.redhat.com/errata/RHSA-2024:2097 -
  • () https://access.redhat.com/errata/RHSA-2024:2098 -

26 Apr 2024, 08:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2055 -
  • () https://access.redhat.com/errata/RHSA-2024:2064 -
  • () https://access.redhat.com/errata/RHSA-2024:2066 -

03 Apr 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/ -

27 Mar 2024, 01:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/ -
Summary
  • (es) Se encontró una falla en Buildah (y posteriormente en Podman Build) que permite que los contenedores monten ubicaciones arbitrarias en el sistema de archivos del host en contenedores de compilación. Un Containerfile malicioso puede usar una imagen ficticia con un enlace simbólico al sistema de archivos raíz como fuente de montaje y hacer que la operación de montaje monte el sistema de archivos raíz del host dentro del paso RUN. Los comandos dentro del paso RUN tendrán acceso de lectura y escritura al sistema de archivos del host, lo que permitirá el escape completo del contenedor en el momento de la compilación.

18 Mar 2024, 17:15

Type Values Removed Values Added
Summary (en) A flaw was found in Buildah (and subsequently Podman Build)which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time. (en) A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

18 Mar 2024, 16:15

Type Values Removed Values Added
Summary (en) A flaw was found in Podman Build and Buildah which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time. (en) A flaw was found in Buildah (and subsequently Podman Build)which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

18 Mar 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 15:15

Updated : 2024-11-21 08:51


NVD link : CVE-2024-1753

Mitre link : CVE-2024-1753

CVE.ORG link : CVE-2024-1753


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management