vulnerability
Red Hat OpenShift: CVE-2024-9341: Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:M/Au:N/C:C/I:P/A:N) | Oct 1, 2024 | Oct 17, 2024 | Apr 11, 2025 |
Severity
8
CVSS
(AV:N/AC:M/Au:N/C:C/I:P/A:N)
Published
Oct 1, 2024
Added
Oct 17, 2024
Modified
Apr 11, 2025
Description
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Solution(s)
linuxrpm-upgrade-cri-olinuxrpm-upgrade-rhcos
References
- CVE-2024-9341
- https://attackerkb.com/topics/CVE-2024-9341
- REDHAT-RHSA-2024:10147
- REDHAT-RHSA-2024:10818
- REDHAT-RHSA-2024:7925
- REDHAT-RHSA-2024:8039
- REDHAT-RHSA-2024:8112
- REDHAT-RHSA-2024:8238
- REDHAT-RHSA-2024:8263
- REDHAT-RHSA-2024:8428
- REDHAT-RHSA-2024:8690
- REDHAT-RHSA-2024:8694
- REDHAT-RHSA-2024:8846
- REDHAT-RHSA-2024:9454
- REDHAT-RHSA-2024:9459

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.