CVE-2024-9676

6.5 MEDIUM
Published: October 15, 2024 Modified: March 19, 2026
View on NVD

Description

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:8418
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8428
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8437
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8686
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8690
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8694
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8700
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:8984
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:9051
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:9454
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:9459
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:9926
Source: secalert@redhat.com
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2024-9676
Source: secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2317467
Source: secalert@redhat.com
Issue Tracking
https://github.com/advisories/GHSA-wq2p-5pc6-wpgf
Source: secalert@redhat.com
Third Party Advisory

21 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
1.3%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redhat