A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-3079 A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Github GHSA Github GHSA GHSA-mc76-5925-c5p6 Link Following in github.com/containers/common
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00264}

epss

{'score': 0.00287}


Sat, 05 Jul 2025 14:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Wed, 11 Dec 2024 13:00:00 +0900

Type Values Removed Values Added
References

Wed, 27 Nov 2024 04:00:00 +0900

Type Values Removed Values Added
References

Sat, 23 Nov 2024 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Containers
Containers common
Redhat openshift Container Platform
CPEs cpe:2.3:a:containers:common:*:*:*:*:*:go:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Containers
Containers common
Redhat openshift Container Platform

Wed, 13 Nov 2024 02:45:00 +0900


Thu, 07 Nov 2024 17:00:00 +0900

Type Values Removed Values Added
First Time appeared Redhat openshift Ironic
CPEs cpe:/a:redhat:openshift:4.12::el8
cpe:/a:redhat:openshift:4.12::el9
cpe:/a:redhat:openshift_ironic:4.12::el9
Vendors & Products Redhat openshift Ironic
References

Thu, 07 Nov 2024 05:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.13::el8
cpe:/a:redhat:openshift:4.13::el9
References

Wed, 06 Nov 2024 11:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8

Tue, 05 Nov 2024 17:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:8::appstream
References

Thu, 31 Oct 2024 14:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.15::el8
cpe:/a:redhat:openshift:4.15::el9
References

Fri, 25 Oct 2024 02:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.16::el8
cpe:/a:redhat:openshift:4.16::el9
References

Thu, 24 Oct 2024 08:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.14::el8
cpe:/a:redhat:openshift:4.14::el9
References

Wed, 16 Oct 2024 09:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.17::el8
cpe:/a:redhat:openshift:4.17::el9
References

Wed, 16 Oct 2024 03:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9
References

Tue, 15 Oct 2024 11:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9

Mon, 14 Oct 2024 23:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9::appstream
References

Wed, 02 Oct 2024 10:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 02 Oct 2024 05:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Oct 2024 04:00:00 +0900

Type Values Removed Values Added
Description A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Title Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-59
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-14T01:33:30.644Z

Reserved: 2024-09-30T15:19:22.496Z

Link: CVE-2024-9341

cve-icon Vulnrichment

Updated: 2024-10-01T19:23:33.089Z

cve-icon NVD

Status : Modified

Published: 2024-10-01T19:15:09.500

Modified: 2024-12-11T04:15:06.090

Link: CVE-2024-9341

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-01T15:45:00Z

Links: CVE-2024-9341 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses