Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1753

Опубликовано: 18 мар. 2024
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

Меры по смягчению последствий

When SELinux is enabled, the container is restricted to limited read-only access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7buildahNot affected
Red Hat Enterprise Linux 7podmanOut of support scope
Red Hat OpenShift Container Platform 3.11podmanOut of support scope
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:208429.04.2024
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:209829.04.2024
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2024:325422.05.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportcontainer-toolsFixedRHSA-2024:209030.04.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportcontainer-toolsFixedRHSA-2024:209729.04.2024
Red Hat Enterprise Linux 8.8 Extended Update Supportcontainer-toolsFixedRHSA-2024:207729.04.2024
Red Hat Enterprise Linux 9buildahFixedRHSA-2024:205525.04.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=2265513buildah: full container escape at build time

EPSS

Процентиль: 20%
0.00063
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

CVSS3: 8.6
nvd
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

CVSS3: 8.6
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 8.6
debian
больше 1 года назад

A flaw was found in Buildah (and subsequently Podman Build) which allo ...

suse-cvrf
больше 1 года назад

Security update for podman

EPSS

Процентиль: 20%
0.00063
Низкий

8.6 High

CVSS3