{"id":"AZL-42506","summary":"CVE-2024-1753 affecting package podman 4.1.1-26","details":"A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.","modified":"2026-04-01T05:14:36.900101Z","published":"2024-03-18T15:15:41Z","upstream":["CVE-2024-1753"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1753"}],"affected":[{"package":{"name":"podman","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/podman"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"4.1.1-26"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-42506.json"}}],"schema_version":"1.7.5"}