Podman Vulnerable to Symlink Traversal Attack

CVE-2024-9676
6.5MEDIUM

Key Information

Vendor
Red Hat
Status
Red Hat Openshift Container Platform 4.12
Red Hat Openshift Container Platform 4.13
Red Hat Openshift Container Platform 4.15
Red Hat Openshift Container Platform 4.16
Vendor
CVE Published:
15 October 2024

Summary

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

Affected Version(s)

Red Hat OpenShift Container Platform 4.12 <= 0:1.25.5-30.rhaos4.12.git53dc492.el8

Red Hat OpenShift Container Platform 4.13 <= 0:1.26.5-26.rhaos4.13.giteb3d487.el8

Red Hat OpenShift Container Platform 4.15 <= 0:1.28.11-5.rhaos4.15.git35a2431.el9

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 6.5 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Erik Sjölund <[email protected]> for reporting this issue.
.