Required CVE Record Information
Description
A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
8.6 | HIGH | 3.1 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Product Status
Learn moreVersions 4 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 1 Total
Default Status: affected
unaffected
Versions 0 Total
Default Status: All versions are affected
References 31 Total
- access.redhat.com: RHSA-2025:0830 vendor-advisory
- access.redhat.com: RHSA-2025:0878 vendor-advisory
- access.redhat.com: RHSA-2025:0922 vendor-advisory
- access.redhat.com: RHSA-2025:0923 vendor-advisory
- access.redhat.com: RHSA-2025:1186 vendor-advisory
- access.redhat.com: RHSA-2025:1187 vendor-advisory
- access.redhat.com: RHSA-2025:1188 vendor-advisory
- access.redhat.com: RHSA-2025:1189 vendor-advisory
- access.redhat.com: RHSA-2025:1207 vendor-advisory
- access.redhat.com: RHSA-2025:1275 vendor-advisory
- access.redhat.com: RHSA-2025:1295 vendor-advisory
- access.redhat.com: RHSA-2025:1296 vendor-advisory
- access.redhat.com: RHSA-2025:1372 vendor-advisory
- access.redhat.com: RHSA-2025:1453 vendor-advisory
- access.redhat.com: RHSA-2025:1707 vendor-advisory
- access.redhat.com: RHSA-2025:1713 vendor-advisory
- access.redhat.com: RHSA-2025:1908 vendor-advisory
- access.redhat.com: RHSA-2025:1910 vendor-advisory
- access.redhat.com: RHSA-2025:1914 vendor-advisory
- access.redhat.com: RHSA-2025:2441 vendor-advisory
- access.redhat.com: RHSA-2025:2443 vendor-advisory
- access.redhat.com: RHSA-2025:2454 vendor-advisory
- access.redhat.com: RHSA-2025:2456 vendor-advisory
- access.redhat.com: RHSA-2025:2701 vendor-advisory
- access.redhat.com: RHSA-2025:2703 vendor-advisory
- access.redhat.com: RHSA-2025:2710 vendor-advisory
- access.redhat.com: RHSA-2025:2712 vendor-advisory
- access.redhat.com: RHSA-2025:3577 vendor-advisory
- access.redhat.com: RHSA-2025:3798 vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-11218 vdb-entry
- bugzilla.redhat.com: RHBZ#2326231 issue-tracking