CVE-2024-11218
Podman: buildah: container breakout by using --jobs=2 and a race condition when building a malicious containerfile
CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.
| CWE | CWE-269 |
| Published | Jan 22, 2025 |
| Last Updated | Mar 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat OpenShift Container Platform 4
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0830 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0878 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0922 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0923 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1186 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1187 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1188 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1189 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1207 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1275 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1295 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1296 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1372 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1453 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1707 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1713 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1908 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1910 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1914 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2441 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2443 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2454 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2456 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2701 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2703 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2710 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2712 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3577 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:3798 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-11218 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2326231 github.com: https://github.com/containers/buildah/pull/5918