CVE-2019-18466Link Following in Containers Libpod

CWE-59Link Following9 documents7 sources
Severity
5.5MEDIUMNVD
EPSS
0.8%
top 25.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 28
Latest updateAug 20

Description

An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Patches

🔴Vulnerability Details

4
OSV
Podman Symlink Vulnerability in github.com/containers/libpod2024-08-20
OSV
Podman Symlink Vulnerability2022-05-24
GHSA
Podman Symlink Vulnerability2022-05-24
CVEList
CVE-2019-18466: An issue was discovered in Podman in libpod before 12019-10-28

📋Vendor Advisories

2
Red Hat
podman: resolving symlink in host filesystem leads to unexpected results of copy operation2019-08-22
Debian
CVE-2019-18466: libpod - An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink ...2019

💬Community

2
Bugzilla
CVE-2019-18466 podman: resolving symlink in host filesystem leads to unexpected results of copy operation [fedora-all]2019-09-23
Bugzilla
CVE-2019-18466 podman: resolving symlink in host filesystem leads to unexpected results of copy operation2019-08-22
CVE-2019-18466 — Link Following in Containers Libpod | cvebase