Podman Vulnerable to Symlink Traversal Attack
Key Information
- Vendor
- Red Hat
- Status
- Red Hat Openshift Container Platform 4.12
- Red Hat Openshift Container Platform 4.13
- Red Hat Openshift Container Platform 4.15
- Red Hat Openshift Container Platform 4.16
- Vendor
- CVE Published:
- 15 October 2024
Summary
A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
Affected Version(s)
Red Hat OpenShift Container Platform 4.12 <= 0:1.25.5-30.rhaos4.12.git53dc492.el8
Red Hat OpenShift Container Platform 4.13 <= 0:1.26.5-26.rhaos4.13.giteb3d487.el8
Red Hat OpenShift Container Platform 4.15 <= 0:1.28.11-5.rhaos4.15.git35a2431.el9
CVSS V3.1
Timeline
Risk change from: null to: 6.5 - (MEDIUM)
Vulnerability published.
Vulnerability Reserved.
Reported to Red Hat.