First published: Tue Oct 01 2024(Updated: )
A flaw in the bind-propagation option of the Dockerfile RUN --mount instruction allows arbitrary parameters to be passed to the underlying mount command. This issue enables an attacker to mount arbitrary host files into a container during the build process and potentially modify them. SELinux does not provide sufficient defense, as the attacker can specify :z or :Z to relabel the host directory for container access. The vulnerability requires an attacker to have build privileges on the system and can lead to unauthorized access and modification of host files, posing significant security risks.
Affected Software | Affected Version | How to fix |
---|---|---|
Docker |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2315887 is considered high due to its potential to allow unauthorized access to host files.
To fix REDHAT-BUG-2315887, update your Docker installation to the latest version that addresses this vulnerability.
REDHAT-BUG-2315887 affects versions of Docker where the bind-propagation option of the RUN --mount instruction is utilized.
Attackers can exploit REDHAT-BUG-2315887 to mount arbitrary host files into containers during the build process.
SELinux protections may not be effective against the misuse of the bind-propagation option exploited in REDHAT-BUG-2315887.