Buildah: full container escape at build time
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Affected products
- *
- ==4.15.0
- *
- *
- *
Matching in nixpkgs
pkgs.podman
Program for managing pods, containers and container images
-
nixos-unstable -
- nixpkgs-unstable 5.6.1
pkgs.podman-tui
Podman Terminal UI
-
nixos-unstable -
- nixpkgs-unstable 1.8.0
pkgs.podman-bootc
Streamlining podman+bootc interactions
-
nixos-unstable -
- nixpkgs-unstable 0.1.2
pkgs.podman-compose
Implementation of docker-compose with podman backend
-
nixos-unstable -
- nixpkgs-unstable 1.5.0
pkgs.podman-desktop
Graphical tool for developing on containers and Kubernetes
-
nixos-unstable -
- nixpkgs-unstable 1.21.0
pkgs.buildah-unwrapped
Tool which facilitates building OCI images
-
nixos-unstable -
- nixpkgs-unstable 1.41.4
pkgs.nomad-driver-podman
Podman task driver for Nomad
-
nixos-unstable -
- nixpkgs-unstable 0.6.3
pkgs.python312Packages.podman
Python bindings for Podman's RESTful API
-
nixos-unstable -
- nixpkgs-unstable 5.6.0
pkgs.python313Packages.podman
Python bindings for Podman's RESTful API
-
nixos-unstable -
- nixpkgs-unstable 5.6.0
Package maintainers
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@saschagrunert Sascha Grunert <mail@saschagrunert.de>
-
@cpcloud Phillip Cloud
-
@evan-goode Evan Goode <mail@evangoo.de>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@booxter Ihar Hrachyshka <ihar.hrachyshka@gmail.com>
-
@aaronjheng Aaron Jheng <wentworth@outlook.com>
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>