Description
An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.
References (6)
Core 6
Core References
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1744588
Exploit, Third Party Advisory x_refsource_misc
https://github.com/containers/libpod/issues/3829
Patch x_refsource_misc
https://github.com/containers/libpod/commit/5c09c4d2947a759724f9d5aef6bac04317e03f7e
Patch x_refsource_misc
https://github.com/containers/libpod/compare/v1.5.1...v1.6.0
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4269
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00040.html
Scores
CVSS v3
5.5
EPSS
0.0084
EPSS Percentile
74.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Details
CWE
CWE-59
Status
published
Products (2)
containers/podman
0 - 1.6.0Go
libpod_project/libpod
< 1.6.0
Published
Oct 28, 2019
Tracked Since
Feb 18, 2026