GHSA-mc76-5925-c5p6

Suggest an improvement
Source
https://github.com/advisories/GHSA-mc76-5925-c5p6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-mc76-5925-c5p6/GHSA-mc76-5925-c5p6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mc76-5925-c5p6
Aliases
Related
Published
2024-10-01T21:31:34Z
Modified
2024-11-12T18:30:51Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N CVSS Calculator
  • 5.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Link Following in github.com/containers/common
Details

A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

References

Affected packages

Go / github.com/containers/common

Package

Name
github.com/containers/common
View open source insights on deps.dev
Purl
pkg:golang/github.com/containers/common

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.60.4