CVE-2024-3727
📋 TL;DR
This vulnerability in the containers/image library allows attackers to trigger authenticated registry accesses on behalf of victims, potentially leading to resource exhaustion, local path traversal, and other attacks. It affects systems using this library for container image operations. Users of container runtimes and orchestration platforms that depend on this library are at risk.
💻 Affected Systems
- github.com/containers/image library
- Podman
- Buildah
- Skopeo
- Container runtimes using containers/image
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through path traversal, denial of service via resource exhaustion, and unauthorized access to container registries.
Likely Case
Resource exhaustion attacks causing service disruption and potential information disclosure through unauthorized registry accesses.
If Mitigated
Limited impact with proper network segmentation, registry authentication controls, and resource limits in place.
🎯 Exploit Status
Requires ability to trigger container image operations on target systems, typically through authenticated access or malicious container images.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.29.0 and later
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:0045
Restart Required: Yes
Instructions:
1. Update containers/image library to version 5.29.0 or later. 2. Update dependent tools (Podman, Buildah, Skopeo) to patched versions. 3. Restart container services and daemons. 4. Verify updates with version checks.
🔧 Temporary Workarounds
Registry Access Restrictions
linuxLimit container registry access to trusted sources only and implement network controls.
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_REGISTRY_IP" port protocol="tcp" port="443" accept'
firewall-cmd --reload
Resource Limits
linuxImplement resource limits on container runtimes to mitigate exhaustion attacks.
systemctl set-property podman.service MemoryLimit=2G
systemctl set-property podman.service CPUQuota=80%
🧯 If You Can't Patch
- Implement strict network segmentation to isolate container registry traffic
- Use read-only or minimal privilege service accounts for registry access
🔍 How to Verify
Check if Vulnerable:
Check containers/image library version: go version -m $(which podman) | grep containers/image
Check Version:
podman version | grep Version
Verify Fix Applied:
Verify containers/image version is 5.29.0 or later: go version -m $(which podman) | grep containers/image
📡 Detection & Monitoring
Log Indicators:
- Unexpected registry authentication attempts
- Abnormal container pull patterns
- Resource exhaustion alerts from container runtime
Network Indicators:
- Unusual outbound connections to container registries
- High volume of image layer downloads
SIEM Query:
source="container_runtime" AND (event="pull" OR event="auth") AND registry!="trusted-registry.example.com"
🔗 References
- https://access.redhat.com/errata/RHSA-2024:0045
- https://access.redhat.com/errata/RHSA-2024:3718
- https://access.redhat.com/errata/RHSA-2024:4159
- https://access.redhat.com/errata/RHSA-2024:4613
- https://access.redhat.com/errata/RHSA-2024:4850
- https://access.redhat.com/errata/RHSA-2024:4960
- https://access.redhat.com/errata/RHSA-2024:5258
- https://access.redhat.com/errata/RHSA-2024:5951
- https://access.redhat.com/errata/RHSA-2024:6054
- https://access.redhat.com/errata/RHSA-2024:6122
- https://access.redhat.com/errata/RHSA-2024:6708
- https://access.redhat.com/errata/RHSA-2024:6818
- https://access.redhat.com/errata/RHSA-2024:6824
- https://access.redhat.com/errata/RHSA-2024:7164
- https://access.redhat.com/errata/RHSA-2024:7174
- https://access.redhat.com/errata/RHSA-2024:7182
- https://access.redhat.com/errata/RHSA-2024:7187
- https://access.redhat.com/errata/RHSA-2024:7922
- https://access.redhat.com/errata/RHSA-2024:7941
- https://access.redhat.com/errata/RHSA-2024:8260
- https://access.redhat.com/errata/RHSA-2024:8425
- https://access.redhat.com/errata/RHSA-2024:9097
- https://access.redhat.com/errata/RHSA-2024:9098
- https://access.redhat.com/errata/RHSA-2024:9102
- https://access.redhat.com/errata/RHSA-2024:9960
- https://access.redhat.com/security/cve/CVE-2024-3727
- https://bugzilla.redhat.com/show_bug.cgi?id=2274767
- https://access.redhat.com/errata/RHSA-2024:0045
- https://access.redhat.com/errata/RHSA-2024:4159
- https://access.redhat.com/errata/RHSA-2024:4613
- https://access.redhat.com/security/cve/CVE-2024-3727
- https://bugzilla.redhat.com/show_bug.cgi?id=2274767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HEYS34N55G7NOQZKNEXZKQVNDGEICCD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6B37TXOKTKDBE2V26X2NSP7JKNMZOFVP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CYT3D2P3OJKISNFKOOHGY6HCUCQZYAVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLND3YDQQRWVRIUPL2G5UKXP5L3VSBBT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTOMYERG5ND4QFDHC4ZSGCED3T3ESRSC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBZQ2ZRMFEUQ35235B2HWPSXGDCBZHFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFXMF3VVKIZN7ZMB7PKZCSWV6MOMTGMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFVSMR7TNLO2KPWJSW4CF64C2QMQXCIN/