Public Date:
1715667: CVE-2019-10152 podman: Improper symlink resolution allows access to host files when executing `podman cp` on running containers
A path traversal vulnerability has been discovered in podman in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.

Find out more about CVE-2019-10152 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue does not affect the versions of podman as shipped with OpenShift Container Platform 4.1 or Red Hat Enterprise Linux 8 as they do not include support for the cp command.

CVSS v3 metrics

CVSS3 Base Score 7.5
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction Required
Scope Changed
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 Extras (podman) RHSA-2019:1907 2019-07-29

Affected Packages State

Platform Package State
Red Hat OpenShift Container Platform 4.1 podman Not affected
Red Hat OpenShift Container Platform 3.11 podman Not affected
Red Hat Enterprise Linux 8 container-tools:1.0/podman Not affected
Red Hat Enterprise Linux 8 container-tools:rhel8/podman Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified