{"id":"CVE-2024-11218","summary":"Podman: buildah: container breakout by using --jobs=2 and a race condition when building a malicious containerfile","details":"A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.","aliases":["GHSA-5vpc-35f4-r8w6","GO-2025-3414"],"modified":"2026-05-01T04:21:58.363145Z","published":"2025-01-22T04:55:30.649Z","related":["ALSA-2025:0922","ALSA-2025:0923","ALSA-2025:1372","CGA-vrc5-grwf-782v","SUSE-SU-2025:0267-1","SUSE-SU-2025:0297-1","SUSE-SU-2025:0301-1","SUSE-SU-2025:0319-1","SUSE-SU-2025:0320-1","SUSE-SU-2025:0382-1","SUSE-SU-2025:0775-1","SUSE-SU-2025:20143-1","SUSE-SU-2025:20279-1","openSUSE-SU-2025:14689-1","openSUSE-SU-2025:14710-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/11xxx/CVE-2024-11218.json","cna_assigner":"redhat","cwe_ids":["CWE-269"]},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://catalog.redhat.com/software/containers/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:0830"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:0878"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:0922"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:0923"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1186"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1187"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1188"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1189"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1207"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1275"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1295"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1296"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1372"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1453"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1707"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1713"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1908"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1910"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1914"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2441"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2443"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2454"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2456"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2701"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2703"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2710"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:2712"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:3577"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:3798"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-11218"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/11xxx/CVE-2024-11218.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326231"},{"type":"FIX","url":"https://github.com/containers/buildah/pull/5918"},{"type":"PACKAGE","url":"https://github.com/containers/buildah"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containers/buildah","events":[{"introduced":"0"},{"fixed":"58af1cdf16e3cdcdf2e885b570c1fa5d04857c3a"},{"introduced":"fedbd79676e8aa5dc49d9434f6d9361b5e00ba62"},{"fixed":"df0b92073ee9d34c1f86e03b4ffb17ec25e514e4"},{"introduced":"f9de1bbd1f80288f541fe59cfffc5849469408e1"},{"fixed":"fd39521492e60607ce8b2867bd44182e15059858"},{"introduced":"7aa3b5ee0470647fcf125930913132fe7c556bcd"},{"fixed":"a07dde1b8d12cd35717aae96ecda38cb6911e9c3"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.33.12"},{"introduced":"1.35.0"},{"fixed":"1.35.5"},{"introduced":"1.37.0"},{"fixed":"1.37.6"},{"introduced":"1.38.0"},{"fixed":"1.38.1"}],"source":"AFFECTED_FIELD"}}],"versions":["1.4","v0.1","v0.10","v0.12","v0.15","v0.2","v0.3","v0.4","v0.5","v0.6","v0.7","v0.8","v1.11.3","v1.11.4","v1.11.5","v1.13.2","v1.3","v1.35.0","v1.37.0","v1.37.4","v1.38.0","v1.4","v1.5","v1.6","v1.7","v1.7.1","v1.7.2","v1.7.3","v1.8.0","v1.8.1","v1.8.2","v1.8.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11218.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}