A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
11 Dec 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2024-10-01 19:15
Updated : 2024-12-11 04:15
NVD link : CVE-2024-9341
Mitre link : CVE-2024-9341
CVE.ORG link : CVE-2024-9341
JSON object : View
Products Affected
containers
- common
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')