{"id":"CVE-2024-9341","details":"A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.","aliases":["GHSA-mc76-5925-c5p6","GO-2024-3171"],"modified":"2026-03-13T07:58:05.368467Z","published":"2024-10-01T19:15:09.500Z","related":["ALSA-2024:8039","ALSA-2024:8112","ALSA-2024:8846","ALSA-2024:9454","ALSA-2024:9459","CGA-2j94-gjmp-422g","MGASA-2024-0343","RLSA-2024:8846","SUSE-SU-2024:3545-1","SUSE-SU-2024:3546-1","SUSE-SU-2024:3911-1","SUSE-SU-2024:3988-1","SUSE-SU-2024:4303-1","SUSE-SU-2025:0267-1","SUSE-SU-2025:0775-1","SUSE-SU-2025:20080-1","openSUSE-SU-2024:0350-1","openSUSE-SU-2024:14388-1","openSUSE-SU-2024:14390-1","openSUSE-SU-2024:14447-1"],"references":[{"type":"WEB","url":"https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L169"},{"type":"WEB","url":"https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L349"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:7925"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8846"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-9341"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:10147"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8039"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8112"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8263"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8428"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8690"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8238"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:9459"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:9454"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:10818"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2315691"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-9341.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.12"}]},{"events":[{"introduced":"0"},{"last_affected":"4.13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.14"}]},{"events":[{"introduced":"0"},{"last_affected":"4.15"}]},{"events":[{"introduced":"0"},{"last_affected":"4.16"}]},{"events":[{"introduced":"0"},{"last_affected":"4.17"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"}]}