An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
References
Configurations
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html - | |
References | () https://access.redhat.com/errata/RHSA-2019:4269 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1744588 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e - Patch | |
References | () https://github.com/containers/libpod/compare/v1.5.1...v1.6.0 - Patch | |
References | () https://github.com/containers/libpod/issues/3829 - Exploit, Third Party Advisory |
Information
Published : 2019-10-28 13:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18466
Mitre link : CVE-2019-18466
CVE.ORG link : CVE-2019-18466
JSON object : View
Products Affected
libpod_project
- libpod
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')