Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1753

Опубликовано: 18 мар. 2024
Источник: redhat
CVSS3: 8.6

Описание

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

Меры по смягчению последствий

When SELinux is enabled, the container is restricted to limited read-only access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7buildahNot affected
Red Hat Enterprise Linux 7podmanOut of support scope
Red Hat OpenShift Container Platform 3.11podmanOut of support scope
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:208429.04.2024
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:209829.04.2024
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:325422.05.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportcontainer-toolsFixedRHSA-2024:209030.04.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportcontainer-toolsFixedRHSA-2024:209729.04.2024
Red Hat Enterprise Linux 8.8 Extended Update Supportcontainer-toolsFixedRHSA-2024:207729.04.2024
Red Hat Enterprise Linux 9buildahFixedRHSA-2024:205525.04.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=2265513buildah: full container escape at build time

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

CVSS3: 8.6
nvd
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

CVSS3: 8.6
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 8.6
debian
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allo ...

suse-cvrf
около 1 года назад

Security update for podman

8.6 High

CVSS3

Уязвимость CVE-2024-1753