A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Nov 2024, 19:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2024:7925 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8039 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8112 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8238 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8263 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8428 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8690 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8694 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:8846 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9454 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9459 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-9341 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2315691 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L169 - Product | |
References | () https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L349 - Product | |
First Time |
Redhat enterprise Linux
Redhat Redhat openshift Container Platform Containers Containers common |
|
CPE | cpe:2.3:a:containers:common:*:*:*:*:*:go:*:* cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:* |
12 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Oct 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Oct 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Oct 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Oct 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-01 19:15
Updated : 2024-11-22 19:34
NVD link : CVE-2024-9341
Mitre link : CVE-2024-9341
CVE.ORG link : CVE-2024-9341
JSON object : View
Products Affected
containers
- common
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')