Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11218: Improper Privilege Management

0
High
VulnerabilityCVE-2024-11218cvecve-2024-11218
Published: Wed Jan 22 2025 (01/22/2025, 04:55:30 UTC)
Source: CVE

Description

A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:09:56 UTC

Technical Analysis

CVE-2024-11218 is a vulnerability discovered in the container image building tools podman build and buildah, specifically triggered when the --jobs=2 option is used during the build process with a crafted malicious Containerfile. The root cause is an improper privilege management combined with a race condition that allows an attacker to escape the container build environment and access the host system. This container breakout can lead to unauthorized enumeration of files and directories on the host, exposing sensitive information and potentially enabling further privilege escalation or system compromise. While SELinux enforcement may reduce the severity by restricting some actions, it does not fully prevent the information disclosure vector. The vulnerability affects multiple versions up to 1.38.0 and has been assigned a CVSS 3.1 score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but user interaction needed (triggering a build). No public exploits are known yet, but the risk is significant given the widespread use of these tools in containerized environments.

Potential Impact

The vulnerability allows attackers to break out of the container build process, leading to unauthorized access to host filesystem information. This can compromise confidentiality by exposing sensitive host files and directories, integrity by potentially enabling further exploitation or modification of host resources, and availability if attackers leverage the breakout for denial-of-service or other disruptive actions. Organizations using podman build or buildah for container image creation are at risk of having their host systems compromised, especially in multi-tenant or shared environments. The impact is amplified in environments where containers are used for critical workloads or where build processes are automated and exposed to untrusted inputs. The partial mitigation by SELinux reduces but does not eliminate the risk, meaning defense-in-depth strategies are necessary.

Mitigation Recommendations

1. Immediately update podman build and buildah to versions patched against CVE-2024-11218 once available. 2. Until patches are applied, avoid using the --jobs=2 option during container builds, or restrict build jobs to a single thread to prevent triggering the race condition. 3. Enforce strict input validation and limit the ability to build containers from untrusted or unaudited Containerfiles. 4. Employ SELinux or other mandatory access control systems to reduce the attack surface, but do not rely solely on them. 5. Isolate build environments using dedicated hosts or virtual machines to contain potential breakouts. 6. Monitor build logs and host filesystem access patterns for unusual activity indicative of exploitation attempts. 7. Implement network segmentation and least privilege principles for build infrastructure to limit lateral movement if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-11-14T13:11:49.476Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd877e

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 3/7/2026, 9:09:56 PM

Last updated: 3/25/2026, 4:20:38 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses