Updated: 2025-05-02 13:36:09.335505
Description:
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | NONE | 0 |
CVSS Version 3.x | HIGH | 8.6 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | podman | 4.4.1 | 8.6 | HIGH | Not Vulnerable | 2025-06-13 04:11:21 | ||
AlmaLinux 9.2 ESU | golang | 1.19.13 | 8.6 | HIGH | Not Vulnerable | 2025-05-12 04:13:52 | ||
AlmaLinux 9.2 ESU | buildah | 1.29.1 | 8.6 | HIGH | Released | CLSA-2025:1746188134 | 2025-05-03 05:49:08 |