CVE-2024-1753
Publication date 18 March 2024
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Status
Package | Ubuntu Release | Status |
---|---|---|
golang-github-containers-buildah | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
References
Other references
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://access.redhat.com/security/cve/CVE-2024-1753
- https://bugzilla.redhat.com/show_bug.cgi?id=2265513
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://www.cve.org/CVERecord?id=CVE-2024-1753