Описание
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | needs-triage | |
noble | needs-triage | |
oracular | needs-triage | |
plucky | needs-triage | |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
A flaw was found in Go. When FIPS mode is enabled on a system, contain ...
EPSS
5.4 Medium
CVSS3