CVE-2024-1753
Buildah: full container escape at build time
CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
| CWE | CWE-59 |
| Published | Mar 18, 2024 |
| Last Updated | Mar 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat OpenShift Container Platform 3.11
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2049 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2055 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2064 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2066 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2077 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2084 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2089 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2090 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2097 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2098 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2548 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2645 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2669 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2672 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2784 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2877 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3254 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1753 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2265513 github.com: https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf github.com: https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3 pkg.go.dev: https://pkg.go.dev/vuln/GO-2024-2658 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/