Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7p9f-6x8j-gxxp

Опубликовано: 26 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 7.4

Описание

CRI-O: Maliciously structured checkpoint file can gain arbitrary node access

Impact

Patches

1.31.1, 1.30.6, 1.29.8

Workarounds

set enable_criu_support = false

References

Are there any links users can visit to find out more?

Пакеты

Наименование

github.com/cri-o/cri-o

go
Затронутые версииВерсия исправления

< 1.29.11

1.29.11

Наименование

github.com/cri-o/cri-o

go
Затронутые версииВерсия исправления

>= 1.30.0, < 1.30.8

1.30.8

Наименование

github.com/cri-o/cri-o

go
Затронутые версииВерсия исправления

>= 1.31.0, < 1.31.3

1.31.3

EPSS

Процентиль: 49%
0.00262
Низкий

6.9 Medium

CVSS4

7.4 High

CVSS3

Дефекты

CWE-285

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
redhat
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
nvd
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
debian
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take ...

EPSS

Процентиль: 49%
0.00262
Низкий

6.9 Medium

CVSS4

7.4 High

CVSS3

Дефекты

CWE-285