An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libpod | Libpod_project | * | 1.6.0 (excluding) |
Red Hat Enterprise Linux 7 Extras | RedHat | podman-0:1.6.4-16.el7_8 | * |
Red Hat Enterprise Linux 8 | RedHat | container-tools:rhel8-8010020191126140055.c294d161 | * |