A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    23 Jun 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
11 Dec 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Nov 2024, 09:47
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking | |
| References | () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory | 
25 Sep 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
24 Sep 2024, 15:18
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.29.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.28.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* cpe:2.3:a:kubernetes:cri-o:1.30.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:* | |
| CWE | CWE-22 | |
| References | () https://access.redhat.com/errata/RHSA-2024:3676 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:3700 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:4008 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:4486 - Vendor Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2024-5154 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2280190 - Issue Tracking | |
| References | () https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8 - Vendor Advisory | |
| First Time | Redhat openshift Container Platform Redhat enterprise Linux Kubernetes Redhat Kubernetes cri-o | 
17 Jul 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
16 Jul 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system. | 
27 Jun 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
18 Jun 2024, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Jun 2024, 18:36
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
12 Jun 2024, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-12 09:15
Updated : 2025-06-23 14:15
NVD link : CVE-2024-5154
Mitre link : CVE-2024-5154
CVE.ORG link : CVE-2024-5154
JSON object : View
Products Affected
                redhat
- openshift_container_platform
- enterprise_linux
kubernetes
- cri-o
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
