Vulnerability Details : CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Products affected by CVE-2024-1753
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-1753
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-1753
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.6
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
1.8
|
6.0
|
Red Hat, Inc. | 2024-03-18 |
8.6
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-1753 | 2024-03-18 |
CWE ids for CVE-2024-1753
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: secalert@redhat.com (Secondary)
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: secalert@redhat.com (Primary)
References for CVE-2024-1753
-
https://access.redhat.com/errata/RHSA-2024:2645
RHSA-2024:2645 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
[SECURITY] Fedora 38 Update: podman-4.9.4-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://access.redhat.com/errata/RHSA-2024:2089
RHSA-2024:2089 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
[SECURITY] Fedora 40 Update: podman-5.0.0-1.fc40 - package-announce - Fedora Mailing-Lists
-
https://access.redhat.com/errata/RHSA-2024:2097
RHSA-2024:2097 - Security Advisory - Red Hat Customer Portal
-
https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
CVE-2024-1753 container escape at build time · Advisory · containers/buildah · GitHub
-
https://access.redhat.com/errata/RHSA-2024:2049
RHSA-2024:2049 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:3254
RHSA-2024:3254 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2055
RHSA-2024:2055 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=2265513
2265513 – (CVE-2024-1753) CVE-2024-1753 buildah: full container escape at build time
-
https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
CVE-2024-1753 container escape at build time · Advisory · containers/podman · GitHub
-
https://access.redhat.com/errata/RHSA-2024:2066
RHSA-2024:2066 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2084
RHSA-2024:2084 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2098
RHSA-2024:2098 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2669
RHSA-2024:2669 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
[SECURITY] Fedora 39 Update: podman-4.9.4-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://pkg.go.dev/vuln/GO-2024-2658
GO-2024-2658 - Go Packages
-
https://access.redhat.com/errata/RHSA-2024:2548
RHSA-2024:2548 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2784
RHSA-2024:2784 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2090
RHSA-2024:2090 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2672
RHSA-2024:2672 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/security/cve/CVE-2024-1753
CVE-2024-1753- Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2077
RHSA-2024:2077 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2877
RHSA-2024:2877 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:2064
RHSA-2024:2064 - Security Advisory - Red Hat Customer Portal
Jump to