{"id":"AZL-42509","summary":"CVE-2024-1753 affecting package buildah 1.18.0-29","details":"A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.","modified":"2026-04-01T05:14:37.185144Z","published":"2024-03-18T15:15:41Z","upstream":["CVE-2024-1753"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1753"}],"affected":[{"package":{"name":"buildah","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/buildah"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"1.18.0-29"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-42509.json"}}],"schema_version":"1.7.5"}