CVE-2024-9341 – github.com/containers/common
Package
Manager: go
Name: github.com/containers/common
Vulnerable Version: >=0 <0.60.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00457 pctl0.63047
Details
Link Following in github.com/containers/common A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Metadata
Created: 2024-10-01T21:31:34Z
Modified: 2024-12-11T06:30:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-mc76-5925-c5p6/GHSA-mc76-5925-c5p6.json
CWE IDs: ["CWE-59"]
Alternative ID: GHSA-mc76-5925-c5p6
Finding: F076
Auto approve: 1