CVE-2024-5154

A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kubernetes:cri-o:1.28.6:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:cri-o:1.29.4:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:cri-o:1.30.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

11 Dec 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:10818 -

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking
References () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory

25 Sep 2024, 06:15

Type Values Removed Values Added
CWE CWE-668

24 Sep 2024, 15:18

Type Values Removed Values Added
First Time Redhat openshift Container Platform
Kubernetes cri-o
Redhat
Kubernetes
Redhat enterprise Linux
CWE CWE-22
References () https://access.redhat.com/errata/RHSA-2024:3676 - () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:3700 - () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:4008 - () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:4486 - () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2024-5154 - () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking
References () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory
CPE cpe:2.3:a:kubernetes:cri-o:1.28.6:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:cri-o:1.30.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:cri-o:1.29.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*

17 Jul 2024, 05:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:4486 -

16 Jul 2024, 18:15

Type Values Removed Values Added
Summary (en) A flaw was found in cri-o. A malicious container can create a symbolic link pointing to an arbitrary directory or file on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system. (en) A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.

27 Jun 2024, 05:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:4008 -

18 Jun 2024, 10:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3700 -

13 Jun 2024, 18:36

Type Values Removed Values Added
Summary
  • (es) Se encontró un defecto en cri-o. Un contenedor malicioso puede crear un enlace simbólico que apunte a un directorio o archivo arbitrario en el host mediante el directory traversal (“../”). Esta falla permite que el contenedor lea y escriba en archivos arbitrarios en el sistema host.

12 Jun 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-12 09:15

Updated : 2024-12-11 04:15


NVD link : CVE-2024-5154

Mitre link : CVE-2024-5154

CVE.ORG link : CVE-2024-5154


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • enterprise_linux

kubernetes

  • cri-o
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')