First published: Wed Jan 22 2025(Updated: )
The UnMountPodLogs and LinkContainerLogs functions in CRI-O do not properly validate the emptyDirVolName parameter, making them vulnerable to a path traversal attack. An attacker can exploit this to unmount arbitrary paths on the host system, potentially causing denial of service or compromising system integrity.
Affected Software | Affected Version | How to fix |
---|---|---|
CRI-O |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2339405 is classified as a high vulnerability due to its potential for path traversal attacks.
To fix REDHAT-BUG-2339405, ensure you validate the emptyDirVolName parameter in the UnMountPodLogs and LinkContainerLogs functions to prevent path traversal.
The potential impacts of REDHAT-BUG-2339405 include denial of service and the ability to unmount arbitrary paths on the host system.
The software affected by REDHAT-BUG-2339405 is CRI-O.
An attacker with access to the CRI-O environment can exploit REDHAT-BUG-2339405 due to the improper validation of the emptyDirVolName parameter.