CVE-2024-9341
ADVISORY - githubSummary
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Common Weakness Enumeration (CWE)
Improper Link Resolution Before File Access ('Link Following')
Improper Link Resolution Before File Access ('Link Following')
Improper Link Resolution Before File Access ('Link Following')
NIST
1.2
CVSS SCORE
5.4mediumGitHub
1.2
CVSS SCORE
5.8mediumAlpine
-
Debian
-
Ubuntu
2.8
CVSS SCORE
8.2mediumGoLang
-
Alma
-
CVSS SCORE
N/AhighAlma
-
CVSS SCORE
N/AhighAlma
-
CVSS SCORE
N/AhighAlma
-
CVSS SCORE
N/AhighAlma
-
CVSS SCORE
N/AhighRed Hat
1.2
CVSS SCORE
5.4mediumRocky
-
CVSS SCORE
N/AhighRocky
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AhighChainguard
CGA-2j94-gjmp-422g
-
Chainguard
CGA-gm82-mrg6-7grc
-
Chainguard
CGA-h5qm-7fj6-3548
-
Chainguard
CGA-m4vw-wxpg-3v8p
-
Chainguard
CGA-mcf2-5cj2-fhm7
-
Chainguard
CGA-p7mp-vc93-97fq
-