A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:3676 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:3700 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:4008 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2024:4486 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2024-5154 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2280190 | Issue Tracking |
https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
25 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
24 Sep 2024, 15:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
References | () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking | |
References | () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.28.6:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.30.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.29.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* |
|
First Time |
Kubernetes
Redhat Redhat enterprise Linux Kubernetes cri-o Redhat openshift Container Platform |
17 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system. |
27 Jun 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jun 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Jun 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-12 09:15
Updated : 2024-09-25 06:15
NVD link : CVE-2024-5154
Mitre link : CVE-2024-5154
CVE.ORG link : CVE-2024-5154
JSON object : View
Products Affected
kubernetes
- cri-o
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')