An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html | |
https://access.redhat.com/errata/RHSA-2019:4269 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1744588 | Issue Tracking Third Party Advisory |
https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e | Patch |
https://github.com/containers/libpod/compare/v1.5.1...v1.6.0 | Patch |
https://github.com/containers/libpod/issues/3829 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-28T12:37:00
Updated: 2020-03-29T00:06:06
Reserved: 2019-10-28T00:00:00
Link: CVE-2019-18466
JSON object: View
NVD Information
Status : Modified
Published: 2019-10-28T13:15:11.430
Modified: 2020-01-15T14:15:11.857
Link: CVE-2019-18466
JSON object: View
Redhat Information
No data.
CWE