Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9676: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
Medium
VulnerabilityCVE-2024-9676cvecve-2024-9676
Published: Tue Oct 15 2024 (10/15/2024, 15:27:33 UTC)
Source: CVE

Description

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:48:06 UTC

Technical Analysis

CVE-2024-9676 is a medium-severity vulnerability discovered in the containers/storage library used by popular container runtimes Podman, Buildah, and CRI-O. The issue is a symlink traversal flaw where the library reads the /etc/passwd file inside a container without properly verifying if the file is a symbolic link. When a malicious container image is run with the automatically assigned user namespace feature enabled (using the --userns=auto flag), an attacker can craft a symlink inside the container that points to an arbitrary file on the host system. This causes the container runtime to read unintended host files, leading to unexpected behavior. Specifically, this triggers the container runtime to hang and consume excessive memory, ultimately causing the host system's OOM killer to terminate the container process. This results in a denial of service (DoS) condition, disrupting container operations. The vulnerability does not allow direct data exfiltration or code execution but impacts the availability of containerized workloads. Exploitation requires the ability to run containers with user namespaces enabled, which is a common security feature to isolate container privileges. The flaw affects all versions of Podman, Buildah, and CRI-O that use the vulnerable containers/storage library and have user namespaces enabled. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 6.5, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high availability impact.

Potential Impact

The primary impact of CVE-2024-9676 is denial of service against containerized environments using Podman, Buildah, or CRI-O with user namespaces enabled. Organizations relying on these container runtimes for application deployment, CI/CD pipelines, or microservices orchestration may experience container hangs and crashes, leading to service interruptions. This can degrade operational continuity, especially in environments with automated container scaling or orchestration where container restarts may cascade into broader service instability. Although the vulnerability does not expose sensitive data or allow privilege escalation directly, the disruption of container workloads can impact business-critical applications and developer productivity. Environments with high container density or limited memory resources are particularly vulnerable to OOM kills triggered by this flaw. Additionally, attackers with container image publishing capabilities could weaponize this vulnerability to cause targeted DoS attacks on container hosts. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as awareness grows.

Mitigation Recommendations

To mitigate CVE-2024-9676, organizations should: 1) Monitor for and apply patches or updates from Podman, Buildah, and CRI-O vendors as soon as they become available to fix the containers/storage library symlink validation issue. 2) Restrict the use of the --userns=auto feature or disable user namespaces if not strictly required, as this feature is a prerequisite for exploitation. 3) Implement strict container image validation policies, including scanning for malicious symlinks or filesystem anomalies before deployment. 4) Employ runtime security tools that monitor container filesystem accesses and detect abnormal symlink traversals or unexpected file reads. 5) Limit container privileges and capabilities to the minimum necessary to reduce attack surface. 6) Use resource limits and cgroups to constrain container memory usage, preventing excessive consumption that could trigger OOM kills. 7) Maintain robust logging and alerting on container runtime hangs or crashes to enable rapid incident response. 8) Consider isolating critical container workloads on dedicated hosts or nodes to contain potential DoS impacts. These measures collectively reduce the likelihood and impact of exploitation beyond generic patching advice.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-09T03:02:48.802Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d68e7d4f2164cc924150f

Added to database: 5/21/2025, 5:47:19 AM

Last enriched: 3/20/2026, 1:48:06 AM

Last updated: 3/26/2026, 8:49:48 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses