A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
Workaround:
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:10818 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3676 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3700 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4008 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4486 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-5154 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2280190 | issue tracking |
https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 | vendor advisory |