CVE Vulnerabilities

CVE-2024-9341

Improper Link Resolution Before File Access ('Link Following')

Published: Oct 01, 2024 | Modified: Dec 11, 2024
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
CommonContainers**
Red Hat Enterprise Linux 8RedHatcontainer-tools:rhel8-8100020241023085649.afee755d*
Red Hat Enterprise Linux 9RedHatpodman-4:4.9.4-13.el9_4*
Red Hat Enterprise Linux 9RedHatbuildah-2:1.33.9-1.el9_4*
Red Hat Enterprise Linux 9RedHatpodman-4:5.2.2-9.el9_5*
Red Hat Enterprise Linux 9RedHatbuildah-2:1.37.5-1.el9_5*
Red Hat OpenShift Container Platform 4.12RedHatcri-o-0:1.25.5-30.rhaos4.12.git53dc492.el8*
Red Hat OpenShift Container Platform 4.13RedHatcri-o-0:1.26.5-26.rhaos4.13.giteb3d487.el8*
Red Hat OpenShift Container Platform 4.14RedHatcri-o-0:1.27.8-10.rhaos4.14.git807f92c.el8*
Red Hat OpenShift Container Platform 4.15RedHatcri-o-0:1.28.11-5.rhaos4.15.git35a2431.el9*
Red Hat OpenShift Container Platform 4.16RedHatcri-o-0:1.29.9-5.rhaos4.16.git34690b9.el8*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202411201433-0*
Red Hat OpenShift Container Platform 4.17RedHatcri-o-0:1.30.6-3.rhaos4.17.git49b5172.el9*
Red Hat OpenShift Container Platform 4.17RedHatrhcos-417.94.202412040832-0*
Golang-github-containers-commonUbuntuoracular*
Golang-github-containers-commonUbuntuplucky*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References