First published: Mon Sep 30 2024(Updated: )
A flaw in the containers/common Go library, used by container runtimes such as Podman, Buildah, and CRI-O, allows a malicious container image to exploit the FIPS mode to bind mount arbitrary host directories into the container. The flaw arises from the MountsWithUIDGID() function, which attempts to mount a FIPS-related directory inside the container but does not properly verify the path. If the FIPS path is a symlink, it could point to arbitrary directories on the host, allowing an attacker to access sensitive host files.
Affected Software | Affected Version | How to fix |
---|---|---|
containers-common | ||
Podman | ||
Buildah | ||
CRI-O |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified as REDHAT-BUG-2315691 is classified as a critical flaw that can allow privilege escalation.
To mitigate REDHAT-BUG-2315691, it is essential to update the containers/common library and associated container runtimes like Podman, Buildah, and CRI-O to the patched versions.
REDHAT-BUG-2315691 affects the containers/common library and container runtimes including Podman, Buildah, and CRI-O.
The root cause of REDHAT-BUG-2315691 is a flaw in the MountsWithUIDGID() function that improperly handles binding host directories in FIPS mode.
Yes, REDHAT-BUG-2315691 presents a significant risk of exploitation, allowing malicious container images to bind mount arbitrary host directories.