First published: Wed Jan 22 2025(Updated: )
A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cri-o/cri-o | <=1.33.0 | |
CRI-O |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0750 is classified as a high severity vulnerability due to its potential for node-level denial of service.
To fix CVE-2025-0750, update CRI-O to a version newer than 1.33.0 and ensure proper permissions are configured for pod management.
CVE-2025-0750 is caused by a path traversal vulnerability in the log management functions within CRI-O.
CVE-2025-0750 affects users of CRI-O versions up to and including 1.33.0 who have permissions to create and delete Pods.
The potential impacts of CVE-2025-0750 include unauthorized unmounting of arbitrary host paths, leading to service disruptions on nodes.