Podman Vulnerable to Symlink Traversal Attack
CVE-2024-9676
6.5MEDIUM
Key Information
- Vendor
- Red Hat
- Status
- Red Hat Enterprise Linux 8
- Red Hat Enterprise Linux 9
- Red Hat Enterprise Linux 9.4 Extended Update Support
- Red Hat Openshift Container Platform 4.12
- Vendor
- CVE Published:
- 15 October 2024
Summary
A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (--userns=auto
in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
Affected Version(s)
Red Hat Enterprise Linux 8 <= 8100020241101101019.afee755d
Red Hat Enterprise Linux 9 <= 4:4.9.4-16.el9_4
Red Hat Enterprise Linux 9 <= 4:5.2.2-9.el9_5
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Erik Sjölund <[email protected]> for reporting this issue.