TencentOS Server 3: container-tools:rhel8 (TSSA-2024:0790)

medium Nessus Plugin ID 276099

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0790 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2024-9341:
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.

CVE-2024-9407:
A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

CVE-2024-9675:
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a RUN instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20240790.xml

Plugin Details

Severity: Medium

ID: 276099

File Name: tencentos_TSSA_2024_0790.nasl

Version: 1.1

Type: local

Published: 11/20/2025

Updated: 11/20/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:N

CVSS Score Source: CVE-2024-9341

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 5.9

Threat Score: 2.1

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-9407

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:slirp4netns, p-cpe:/a:tencent:tencentos_server:udica, p-cpe:/a:tencent:tencentos_server:containernetworking-plugins, p-cpe:/a:tencent:tencentos_server:containers-common, p-cpe:/a:tencent:tencentos_server:skopeo, p-cpe:/a:tencent:tencentos_server:netavark, p-cpe:/a:tencent:tencentos_server:podman, cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:python-podman, p-cpe:/a:tencent:tencentos_server:runc, p-cpe:/a:tencent:tencentos_server:crun, p-cpe:/a:tencent:tencentos_server:conmon, p-cpe:/a:tencent:tencentos_server:criu, p-cpe:/a:tencent:tencentos_server:toolbox, p-cpe:/a:tencent:tencentos_server:aardvark-dns, p-cpe:/a:tencent:tencentos_server:cockpit-podman, p-cpe:/a:tencent:tencentos_server:buildah, p-cpe:/a:tencent:tencentos_server:libslirp, p-cpe:/a:tencent:tencentos_server:fuse-overlayfs, p-cpe:/a:tencent:tencentos_server:oci-seccomp-bpf-hook, p-cpe:/a:tencent:tencentos_server:container-selinux

Required KB Items: Host/local_checks_enabled, Host/etc/os-release, Host/TencentOS/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/5/2024

Vulnerability Publication Date: 10/1/2024

Reference Information

CVE: CVE-2024-9341, CVE-2024-9407, CVE-2024-9675

IAVA: 2024-A-0599, 2024-A-0672-S