ALT-PU-2024-4647-2
Closed vulnerabilities
Published: 2024-03-18
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Severity: HIGH (8.6)
Vector: AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Severity: HIGH (7.2)
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
References:
Published: 2024-03-18
Modified: 2024-11-26
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Severity: HIGH (8.6)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
References:
- https://access.redhat.com/errata/RHSA-2024:2049
- https://access.redhat.com/errata/RHSA-2024:2055
- https://access.redhat.com/errata/RHSA-2024:2064
- https://access.redhat.com/errata/RHSA-2024:2066
- https://access.redhat.com/errata/RHSA-2024:2077
- https://access.redhat.com/errata/RHSA-2024:2084
- https://access.redhat.com/errata/RHSA-2024:2089
- https://access.redhat.com/errata/RHSA-2024:2090
- https://access.redhat.com/errata/RHSA-2024:2097
- https://access.redhat.com/errata/RHSA-2024:2098
- https://access.redhat.com/errata/RHSA-2024:2548
- https://access.redhat.com/errata/RHSA-2024:2645
- https://access.redhat.com/errata/RHSA-2024:2669
- https://access.redhat.com/errata/RHSA-2024:2672
- https://access.redhat.com/errata/RHSA-2024:2784
- https://access.redhat.com/errata/RHSA-2024:2877
- https://access.redhat.com/errata/RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- https://bugzilla.redhat.com/show_bug.cgi?id=2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- https://access.redhat.com/errata/RHSA-2024:2049
- https://access.redhat.com/errata/RHSA-2024:2055
- https://access.redhat.com/errata/RHSA-2024:2064
- https://access.redhat.com/errata/RHSA-2024:2066
- https://access.redhat.com/errata/RHSA-2024:2077
- https://access.redhat.com/errata/RHSA-2024:2084
- https://access.redhat.com/errata/RHSA-2024:2089
- https://access.redhat.com/errata/RHSA-2024:2090
- https://access.redhat.com/errata/RHSA-2024:2097
- https://access.redhat.com/errata/RHSA-2024:2098
- https://access.redhat.com/errata/RHSA-2024:2548
- https://access.redhat.com/errata/RHSA-2024:2645
- https://access.redhat.com/errata/RHSA-2024:2669
- https://access.redhat.com/errata/RHSA-2024:2672
- https://access.redhat.com/errata/RHSA-2024:2784
- https://access.redhat.com/errata/RHSA-2024:2877
- https://access.redhat.com/errata/RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- https://bugzilla.redhat.com/show_bug.cgi?id=2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
Closed bugs
/usr/libexec/podman/catatonit: no such file or directory