Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9676: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
Medium
VulnerabilityCVE-2024-9676cvecve-2024-9676
Published: Tue Oct 15 2024 (10/15/2024, 15:27:33 UTC)
Source: CVE

Description

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

AI-Powered Analysis

AILast updated: 11/27/2025, 15:40:52 UTC

Technical Analysis

CVE-2024-9676 is a path traversal vulnerability identified in the containers/storage library used by popular container runtimes Podman, Buildah, and CRI-O. The vulnerability occurs when these tools run containers with an automatically assigned user namespace (--userns=auto). In this mode, the library reads the /etc/passwd file inside the container but fails to properly validate whether this file is a symbolic link. An attacker can exploit this by crafting a malicious container image where /etc/passwd is a symlink pointing to an arbitrary file on the host system. When the container runtime attempts to read this symlinked file, it can cause the process to hang and consume excessive memory, eventually triggering an out-of-memory (OOM) kill on the host. This results in a denial of service (DoS) condition affecting container availability. The vulnerability does not impact confidentiality or integrity directly, as it does not allow arbitrary code execution or data modification. Exploitation requires the ability to run containers with user namespaces enabled, which implies some level of privilege. No user interaction is needed once the container is launched. The CVSS v3.1 score is 6.5 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and high availability impact. There are no known exploits in the wild at the time of publication. The vulnerability was reserved and published in October 2024, with enrichment from CISA. No patches or vendor advisories are linked yet, indicating the need for vigilance and prompt patching once available.

Potential Impact

European organizations using Podman, Buildah, or CRI-O for container orchestration and development are at risk of service disruption due to this vulnerability. The denial of service caused by OOM kills can interrupt critical containerized applications, impacting business continuity and operational efficiency. Sectors relying heavily on containerization, such as finance, telecommunications, manufacturing, and public services, could face outages or degraded performance. Since the vulnerability requires running containers with user namespaces enabled, environments that adopt this security feature for isolation may be more exposed. The lack of confidentiality or integrity impact limits the risk of data breaches, but availability loss can still cause significant operational and reputational damage. Additionally, the ability to cause host-level resource exhaustion may complicate incident response and recovery. European organizations with automated container deployment pipelines should be cautious about using untrusted container images, as malicious images trigger the vulnerability. Overall, the impact is primarily on availability, with medium severity, but the widespread use of affected container tools in Europe elevates the risk profile.

Mitigation Recommendations

1. Monitor vendor advisories closely and apply patches or updates to Podman, Buildah, and CRI-O as soon as they become available to address CVE-2024-9676. 2. Avoid using the --userns=auto option when running containers until the vulnerability is patched, or restrict its use to trusted images and environments. 3. Implement strict image provenance and scanning policies to prevent deployment of malicious container images that exploit symlink traversal. 4. Employ runtime security tools to detect abnormal container behavior, such as unexpected file access patterns or excessive memory consumption, enabling early detection of exploitation attempts. 5. Limit container privileges and capabilities to reduce the impact of potential exploits, including restricting access to host filesystem paths. 6. Use container security frameworks that enforce filesystem access controls and symlink resolution policies to prevent traversal attacks. 7. Conduct regular security audits and penetration testing focused on container runtime configurations and namespace usage. 8. Educate developers and DevOps teams about the risks of automatic user namespaces and symlink handling in container environments to encourage secure configuration practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-09T03:02:48.802Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d68e7d4f2164cc924150f

Added to database: 5/21/2025, 5:47:19 AM

Last enriched: 11/27/2025, 3:40:52 PM

Last updated: 12/3/2025, 7:59:57 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats