First published: Mon Sep 30 2024(Updated: )
A flaw in the containers/common Go library, used by container runtimes such as Podman, Buildah, and CRI-O, allows a malicious container image to exploit the FIPS mode to bind mount arbitrary host directories into the container. The flaw arises from the MountsWithUIDGID() function, which attempts to mount a FIPS-related directory inside the container but does not properly verify the path. If the FIPS path is a symlink, it could point to arbitrary directories on the host, allowing an attacker to access sensitive host files.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containers/common | <0.60.4 | 0.60.4 |
containers-common | ||
Red Hat OpenShift Container Platform | =4.12 | |
Red Hat OpenShift Container Platform | =4.13 | |
Red Hat OpenShift Container Platform | =4.14 | |
Red Hat OpenShift Container Platform | =4.15 | |
Red Hat OpenShift Container Platform | =4.16 | |
Red Hat OpenShift Container Platform | =4.17 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9341 has been assigned a critical severity due to its potential for exploitation in container environments.
To mitigate CVE-2024-9341, it is recommended to upgrade to the remedy version 0.60.4 of the containers/common Go library.
Vulnerable software versions for CVE-2024-9341 include specific versions of Red Hat OpenShift Container Platform from 4.12 to 4.17 and Red Hat Enterprise Linux 8.0 and 9.0.
CVE-2024-9341 could allow a malicious container to bind mount arbitrary host directories, compromising the host system's integrity.
No specific workarounds have been recommended for CVE-2024-9341, so applying the fix is critical.