{ "id": "CVE-2024-11218", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-22T05:15:08.903", "lastModified": "2025-03-13T18:15:36.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en `podman build` y `buildah`. Este problema ocurre en una ruptura de contenedor mediante el uso de --jobs=2 y una condici\u00f3n ejecuci\u00f3n al crear un Containerfile malicioso. SELinux podr\u00eda mitigarlo, pero incluso con SELinux activado, a\u00fan permite la enumeraci\u00f3n de archivos y directorios en el host." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert@redhat.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 6.0 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-269" } ] } ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2025:0830", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:0878", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:0922", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:0923", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1186", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1187", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1188", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1189", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1207", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1275", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1295", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1296", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1372", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1453", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1707", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1713", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1908", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1910", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:1914", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:2441", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:2443", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:2454", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2025:2456", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11218", "source": "secalert@redhat.com" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326231", "source": "secalert@redhat.com" } ] }