Home

Description

A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.

PUBLISHED Reserved 2024-11-14 | Published 2025-01-22 | Updated 2026-03-04 | Assigner redhat




HIGH: 8.6CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Problem types

Improper Privilege Management

Product status

Default status
unaffected

Any version before 1.33.12
affected

1.35.0 (semver) before 1.35.5
affected

1.37.0 (semver) before 1.37.6
affected

1.38.0 (semver) before 1.38.1
affected

Default status
affected

8100020250124120243.afee755d (rpm) before *
unaffected

Default status
affected

8060020250203202123.3b538bd8 (rpm) before *
unaffected

Default status
affected

8060020250203202123.3b538bd8 (rpm) before *
unaffected

Default status
affected

8060020250203202123.3b538bd8 (rpm) before *
unaffected

Default status
affected

8080020250207173112.0f77c1b7 (rpm) before *
unaffected

Default status
affected

4:5.2.2-13.el9_5 (rpm) before *
unaffected

Default status
affected

2:1.37.6-1.el9_5 (rpm) before *
unaffected

Default status
affected

2:4.2.0-6.el9_0 (rpm) before *
unaffected

Default status
affected

1:1.26.9-1.el9_0 (rpm) before *
unaffected

Default status
affected

1:1.29.5-1.el9_2 (rpm) before *
unaffected

Default status
affected

2:4.4.1-22.el9_2 (rpm) before *
unaffected

Default status
affected

2:1.33.12-2.el9_4 (rpm) before *
unaffected

Default status
affected

4:4.9.4-17.el9_4 (rpm) before *
unaffected

Default status
affected

412.86.202503052321-0 (rpm) before *
unaffected

Default status
affected

3:4.2.0-13.rhaos4.12.el9 (rpm) before *
unaffected

Default status
affected

1:1.29.5-1.rhaos4.13.el9 (rpm) before *
unaffected

Default status
affected

3:4.4.1-16.rhaos4.13.el8 (rpm) before *
unaffected

Default status
affected

413.92.202503112237-0 (rpm) before *
unaffected

Default status
affected

3:4.4.1-22.rhaos4.14.el8 (rpm) before *
unaffected

Default status
affected

1:1.29.5-1.rhaos4.14.el8 (rpm) before *
unaffected

Default status
affected

414.92.202503100617-0 (rpm) before *
unaffected

Default status
affected

3:4.4.1-33.rhaos4.15.el8 (rpm) before *
unaffected

Default status
affected

1:1.29.5-1.rhaos4.15.el9 (rpm) before *
unaffected

Default status
affected

415.92.202503060749-0 (rpm) before *
unaffected

Default status
affected

4:4.9.4-15.rhaos4.16.el9 (rpm) before *
unaffected

Default status
affected

2:1.33.12-1.rhaos4.16.el8 (rpm) before *
unaffected

Default status
affected

416.94.202502180249-0 (rpm) before *
unaffected

Default status
affected

5:5.2.2-2.rhaos4.17.el8 (rpm) before *
unaffected

Default status
affected

2:1.33.12-1.rhaos4.17.el9 (rpm) before *
unaffected

Default status
affected

417.94.202504080421-0 (rpm) before *
unaffected

Default status
affected

2:1.33.12-1.rhaos4.18.el9 (rpm) before *
unaffected

Default status
affected

418.94.202504021150-0 (rpm) before *
unaffected

Default status
unaffected

Default status
affected

Default status
affected

Timeline

2024-11-14:Reported to Red Hat.
2025-01-20:Made public.

References

access.redhat.com/errata/RHSA-2025:0830 (RHSA-2025:0830) vendor-advisory

access.redhat.com/errata/RHSA-2025:0878 (RHSA-2025:0878) vendor-advisory

access.redhat.com/errata/RHSA-2025:0922 (RHSA-2025:0922) vendor-advisory

access.redhat.com/errata/RHSA-2025:0923 (RHSA-2025:0923) vendor-advisory

access.redhat.com/errata/RHSA-2025:1186 (RHSA-2025:1186) vendor-advisory

access.redhat.com/errata/RHSA-2025:1187 (RHSA-2025:1187) vendor-advisory

access.redhat.com/errata/RHSA-2025:1188 (RHSA-2025:1188) vendor-advisory

access.redhat.com/errata/RHSA-2025:1189 (RHSA-2025:1189) vendor-advisory

access.redhat.com/errata/RHSA-2025:1207 (RHSA-2025:1207) vendor-advisory

access.redhat.com/errata/RHSA-2025:1275 (RHSA-2025:1275) vendor-advisory

access.redhat.com/errata/RHSA-2025:1295 (RHSA-2025:1295) vendor-advisory

access.redhat.com/errata/RHSA-2025:1296 (RHSA-2025:1296) vendor-advisory

access.redhat.com/errata/RHSA-2025:1372 (RHSA-2025:1372) vendor-advisory

access.redhat.com/errata/RHSA-2025:1453 (RHSA-2025:1453) vendor-advisory

access.redhat.com/errata/RHSA-2025:1707 (RHSA-2025:1707) vendor-advisory

access.redhat.com/errata/RHSA-2025:1713 (RHSA-2025:1713) vendor-advisory

access.redhat.com/errata/RHSA-2025:1908 (RHSA-2025:1908) vendor-advisory

access.redhat.com/errata/RHSA-2025:1910 (RHSA-2025:1910) vendor-advisory

access.redhat.com/errata/RHSA-2025:1914 (RHSA-2025:1914) vendor-advisory

access.redhat.com/errata/RHSA-2025:2441 (RHSA-2025:2441) vendor-advisory

access.redhat.com/errata/RHSA-2025:2443 (RHSA-2025:2443) vendor-advisory

access.redhat.com/errata/RHSA-2025:2454 (RHSA-2025:2454) vendor-advisory

access.redhat.com/errata/RHSA-2025:2456 (RHSA-2025:2456) vendor-advisory

access.redhat.com/errata/RHSA-2025:2701 (RHSA-2025:2701) vendor-advisory

access.redhat.com/errata/RHSA-2025:2703 (RHSA-2025:2703) vendor-advisory

access.redhat.com/errata/RHSA-2025:2710 (RHSA-2025:2710) vendor-advisory

access.redhat.com/errata/RHSA-2025:2712 (RHSA-2025:2712) vendor-advisory

access.redhat.com/errata/RHSA-2025:3577 (RHSA-2025:3577) vendor-advisory

access.redhat.com/errata/RHSA-2025:3798 (RHSA-2025:3798) vendor-advisory

access.redhat.com/security/cve/CVE-2024-11218 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2326231 (RHBZ#2326231) issue-tracking

github.com/containers/buildah/pull/5918

cve.org (CVE-2024-11218)

nvd.nist.gov (CVE-2024-11218)

Download JSON