CVE-2024-9341

CWE-599 documents7 sources
Severity
8.2HIGH
EPSS
0.9%
top 24.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1
Latest updateOct 14

Description

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:NExploitability: 1.2 | Impact: 4.2

Affected Packages2 packages

Also affects: Openshift Container Platform 4.12, 4.13, 4.14, 4.15, 4.16, 4.17, Enterprise Linux 8.0, 9.0

🔴Vulnerability Details

5
OSV
Link Following in github.com/containers/common2024-10-14
GHSA
Link Following in github.com/containers/common2024-10-01
OSV
CVE-2024-9341: A flaw was found in Go2024-10-01
OSV
Link Following in github.com/containers/common2024-10-01
CVEList
Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library2024-10-01

📋Vendor Advisories

3
Microsoft
Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library2024-10-08
Red Hat
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library2024-10-01
Debian
CVE-2024-9341: golang-github-containers-common - A flaw was found in Go. When FIPS mode is enabled on a system, container runtime...2024
CVE-2024-9341 (HIGH CVSS 8.2) | A flaw was found in Go | cvebase.io