Improper Privilege Management Affecting buildah package, versions <2:1.33.7-1.module+el8.10.0+21590+d7d75709
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-BUILDAH-6462645
- published 19 Mar 2024
- disclosed 18 Mar 2024
Introduced: 18 Mar 2024
CVE-2024-1753 Open this link in a new tabHow to fix?
Upgrade Centos:8
buildah
to version 2:1.33.7-1.module+el8.10.0+21590+d7d75709 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream buildah
package and not the buildah
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
References
- https://access.redhat.com/security/cve/CVE-2024-1753
- https://bugzilla.redhat.com/show_bug.cgi?id=2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://access.redhat.com/errata/RHSA-2024:3254