First published: Thu Aug 22 2019(Updated: )
An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containers/podman/v4 | <1.6.0 | 1.6.0 |
redhat/podman | <0:1.6.4-16.el7_8 | 0:1.6.4-16.el7_8 |
Libpod Project Libpod | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18466 is a vulnerability discovered in Podman in libpod before 1.6.0.
CVE-2019-18466 has a severity rating of medium with a CVSS score of 5.5.
CVE-2019-18466 affects Podman in libpod before version 1.6.0.
An attacker can create a container image containing specific symlinks that, when copied, can lead to a symlink resolution vulnerability in Podman.
Yes, the remedy for CVE-2019-18466 is to upgrade to version 1.6.0 of libpod.