{
  "threat_severity" : "Important",
  "public_date" : "2024-03-18T00:00:00Z",
  "bugzilla" : {
    "description" : "buildah: full container escape at build time",
    "id" : "2265513",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2265513"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-59",
  "details" : [ "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.", "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-04-29T00:00:00Z",
    "advisory" : "RHSA-2024:2084",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:4.0-8090020240413110917.d7b6f4b7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-04-29T00:00:00Z",
    "advisory" : "RHSA-2024:2098",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:rhel8-8090020240417184044.e7857ab1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3254",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "container-tools:rhel8-8100020240419145834.afee755d"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2090",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "container-tools:rhel8-8060020240422155330.3b538bd8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2024-04-29T00:00:00Z",
    "advisory" : "RHSA-2024:2097",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "container-tools:4.0-8060020240419071711.2e213529"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-04-29T00:00:00Z",
    "advisory" : "RHSA-2024:2077",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "container-tools:rhel8-8080020240422101606.0f77c1b7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-25T00:00:00Z",
    "advisory" : "RHSA-2024:2055",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "buildah-1:1.31.5-1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2548",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "podman-4:4.9.4-3.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support",
    "release_date" : "2024-04-25T00:00:00Z",
    "advisory" : "RHSA-2024:2066",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.0",
    "package" : "buildah-1:1.26.7-1.el9_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2089",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.0",
    "package" : "podman-2:4.2.0-3.el9_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-04-25T00:00:00Z",
    "advisory" : "RHSA-2024:2064",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "buildah-1:1.29.3-1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-05-01T00:00:00Z",
    "advisory" : "RHSA-2024:2645",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "podman-2:4.4.1-16.el9_2"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.12",
    "release_date" : "2024-05-16T00:00:00Z",
    "advisory" : "RHSA-2024:2784",
    "cpe" : "cpe:/a:redhat:openshift:4.12::el8",
    "package" : "podman-3:4.4.1-3.2.rhaos4.12.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2024-05-02T00:00:00Z",
    "advisory" : "RHSA-2024:2049",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "podman-3:4.4.1-5.3.rhaos4.13.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2024-05-23T00:00:00Z",
    "advisory" : "RHSA-2024:2877",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "podman-3:4.4.1-7.3.rhaos4.13.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.14",
    "release_date" : "2024-05-09T00:00:00Z",
    "advisory" : "RHSA-2024:2672",
    "cpe" : "cpe:/a:redhat:openshift:4.14::el8",
    "package" : "podman-3:4.4.1-13.4.rhaos4.14.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.15",
    "release_date" : "2024-05-09T00:00:00Z",
    "advisory" : "RHSA-2024:2669",
    "cpe" : "cpe:/a:redhat:openshift:4.15::el8",
    "package" : "podman-3:4.4.1-23.2.rhaos4.15.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "buildah",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "podman",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Out of support scope",
    "package_name" : "podman",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-1753\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-1753\nhttps://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf\nhttps://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3\nhttps://pkg.go.dev/vuln/GO-2024-2658" ],
  "name" : "CVE-2024-1753",
  "mitigation" : {
    "value" : "When SELinux is enabled, the container is restricted to limited read-only access.",
    "lang" : "en:us"
  },
  "csaw" : false
}