CVE-2024-9341
Severity
8.2HIGH
EPSS
0.9%
top 24.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Latest updateOct 14
Description
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:NExploitability: 1.2 | Impact: 4.2
Affected Packages2 packages
Also affects: Openshift Container Platform 4.12, 4.13, 4.14, 4.15, 4.16, 4.17, Enterprise Linux 8.0, 9.0
🔴Vulnerability Details
5CVEList▶
Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library↗2024-10-01
📋Vendor Advisories
3Microsoft▶
Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library↗2024-10-08
Red Hat▶
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library↗2024-10-01
Debian▶
CVE-2024-9341: golang-github-containers-common - A flaw was found in Go. When FIPS mode is enabled on a system, container runtime...↗2024