Flaw in Go Container Runtimes Allows Attackers to Bypass Isolation

CVE-2024-9341
5.4MEDIUM

Key Information

Vendor
Red Hat
Status
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9
Red Hat Openshift Container Platform 4.12
Red Hat Openshift Container Platform 4.13
Vendor
CVE Published:
1 October 2024

Summary

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

Affected Version(s)

Red Hat Enterprise Linux 8 <= 8100020241023085649.afee755d

Red Hat Enterprise Linux 9 <= 4:4.9.4-13.el9_4

Red Hat Enterprise Linux 9 <= 2:1.33.9-1.el9_4

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Risk change from: null to: 5.4 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Paul Holzinger for reporting this issue.
.