CVE-2024-9341

5.4 MEDIUM

📋 TL;DR

This vulnerability in Go's containers/common library allows attackers to exploit symbolic links when FIPS mode is enabled, potentially mounting sensitive host directories inside containers. This bypasses container isolation and could allow access to critical host files. Affected systems are those running container runtimes with FIPS mode enabled.

💻 Affected Systems

Products:
  • container runtimes using containers/common library (Podman, CRI-O, Buildah)
  • Red Hat Enterprise Linux
  • Fedora
  • CentOS Stream
Versions: Versions before containers/common v0.58.2
Operating Systems: Linux distributions with FIPS mode support
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when FIPS mode is explicitly enabled on the system. Standard configurations without FIPS are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain read/write access to sensitive host files like /etc/passwd, /etc/shadow, or Kubernetes secrets, potentially leading to full host compromise.

🟠

Likely Case

Attackers access container host files they shouldn't have access to, potentially stealing credentials, configuration files, or sensitive data.

🟢

If Mitigated

With proper container security policies and host hardening, impact is limited to specific mounted directories rather than full host access.

🌐 Internet-Facing: MEDIUM - Requires container runtime access and FIPS mode enabled, but could be exploited if containers are exposed.
🏢 Internal Only: HIGH - In containerized environments with FIPS mode, this provides a path for privilege escalation and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have some level of container access and ability to create/manipulate symbolic links. FIPS mode must be enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: containers/common v0.58.2 or later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:10147

Restart Required: Yes

Instructions:

1. Update containers/common package to v0.58.2 or later. 2. Update container runtime (Podman/CRI-O) to versions containing the fix. 3. Restart container runtime services. 4. Rebuild any affected containers.

🔧 Temporary Workarounds

Disable FIPS mode

linux

Temporarily disable FIPS mode if not required for compliance

fips-mode-setup --disable
systemctl reboot

Restrict container capabilities

linux

Remove CAP_SYS_ADMIN and other unnecessary capabilities from containers

podman run --cap-drop=ALL --cap-add=...
docker run --cap-drop=ALL --cap-add=...

🧯 If You Can't Patch

  • Implement strict container security policies using SELinux/AppArmor
  • Monitor for suspicious container activities and file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if FIPS mode is enabled: 'fips-mode-setup --check' and check containers/common version: 'rpm -q containers-common'

Check Version:

rpm -q containers-common && fips-mode-setup --check

Verify Fix Applied:

Verify containers/common version is v0.58.2 or later: 'rpm -q containers-common | grep 0.58.2'

📡 Detection & Monitoring

Log Indicators:

  • Unusual container mount operations
  • Access to host paths from containers
  • Symbolic link creation in container volumes

Network Indicators:

  • N/A - Local vulnerability

SIEM Query:

container.runtime:* AND (event.action:"mount" OR event.action:"symlink") AND host.path:"/etc/*"

🔗 References

📤 Share & Export