CVE Vulnerabilities

CVE-2024-1753

Improper Link Resolution Before File Access ('Link Following')

Published: Mar 18, 2024 | Modified: Nov 26, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8.6 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 8RedHatcontainer-tools:4.0-8090020240413110917.d7b6f4b7*
Red Hat Enterprise Linux 8RedHatcontainer-tools:rhel8-8090020240417184044.e7857ab1*
Red Hat Enterprise Linux 8RedHatcontainer-tools:rhel8-8100020240419145834.afee755d*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatcontainer-tools:rhel8-8060020240422155330.3b538bd8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatcontainer-tools:4.0-8060020240419071711.2e213529*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatcontainer-tools:rhel8-8080020240422101606.0f77c1b7*
Red Hat Enterprise Linux 9RedHatbuildah-1:1.31.5-1.el9_3*
Red Hat Enterprise Linux 9RedHatpodman-4:4.9.4-3.el9_4*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatbuildah-1:1.26.7-1.el9_0*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatpodman-2:4.2.0-3.el9_0*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatbuildah-1:1.29.3-1.el9_2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatpodman-2:4.4.1-16.el9_2*
Red Hat OpenShift Container Platform 4.12RedHatpodman-3:4.4.1-3.2.rhaos4.12.el8*
Red Hat OpenShift Container Platform 4.13RedHatpodman-3:4.4.1-5.3.rhaos4.13.el8*
Red Hat OpenShift Container Platform 4.13RedHatpodman-3:4.4.1-7.3.rhaos4.13.el8*
Red Hat OpenShift Container Platform 4.14RedHatpodman-3:4.4.1-13.4.rhaos4.14.el8*
Red Hat OpenShift Container Platform 4.15RedHatpodman-3:4.4.1-23.2.rhaos4.15.el9*
Golang-github-containers-buildahUbuntumantic*
Golang-github-containers-buildahUbuntuoracular*
Golang-github-containers-buildahUbuntuplucky*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References