vulnerability

CentOS Linux: CVE-2019-18466: Important: container-tools:rhel8 security and bug fix update (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Oct 28, 2019
Added
Jan 20, 2020
Modified
May 25, 2023

Description

An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.

Solutions

centos-upgrade-buildahcentos-upgrade-buildah-debuginfocentos-upgrade-buildah-debugsourcecentos-upgrade-buildah-testscentos-upgrade-buildah-tests-debuginfocentos-upgrade-cockpit-podmancentos-upgrade-container-selinuxcentos-upgrade-containernetworking-pluginscentos-upgrade-containernetworking-plugins-debuginfocentos-upgrade-containernetworking-plugins-debugsourcecentos-upgrade-containers-commoncentos-upgrade-fuse-overlayfscentos-upgrade-fuse-overlayfs-debuginfocentos-upgrade-fuse-overlayfs-debugsourcecentos-upgrade-oci-systemd-hookcentos-upgrade-oci-systemd-hook-debuginfocentos-upgrade-oci-systemd-hook-debugsourcecentos-upgrade-oci-umountcentos-upgrade-oci-umount-debuginfocentos-upgrade-oci-umount-debugsourcecentos-upgrade-podmancentos-upgrade-podman-debuginfocentos-upgrade-podman-debugsourcecentos-upgrade-podman-dockercentos-upgrade-podman-manpagescentos-upgrade-podman-remotecentos-upgrade-podman-remote-debuginfocentos-upgrade-podman-testscentos-upgrade-python-podman-apicentos-upgrade-runccentos-upgrade-runc-debuginfocentos-upgrade-runc-debugsourcecentos-upgrade-skopeocentos-upgrade-skopeo-debuginfocentos-upgrade-skopeo-debugsourcecentos-upgrade-skopeo-testscentos-upgrade-slirp4netnscentos-upgrade-slirp4netns-debuginfocentos-upgrade-slirp4netns-debugsourcecentos-upgrade-toolbox
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.