Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8676

Опубликовано: 26 нояб. 2024
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8container-tools:rhel8/conmonNot affected
Red Hat Enterprise Linux 8container-tools:rhel8/podmanWill not fix
Red Hat Enterprise Linux 9conmonNot affected
Red Hat OpenShift Container Platform 3.11cri-oOut of support scope
Red Hat OpenShift Container Platform 4conmonNot affected
Red Hat OpenShift Container Platform 4rhcosAffected
Red Hat OpenShift Container Platform 4.15cri-oFixedRHSA-2025:064829.01.2025
Red Hat OpenShift Container Platform 4.16cri-oFixedRHBA-2024:1082612.12.2024
Red Hat OpenShift Container Platform 4.16rhcos-416.94.202506251808FixedRHSA-2025:976502.07.2025
Red Hat OpenShift Container Platform 4.17rhcos-417.94.202503241418FixedRHSA-2025:329703.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2313842cri-o: Checkpoint restore can be triggered from different namespaces

EPSS

Процентиль: 49%
0.00262
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
nvd
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
debian
около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take ...

CVSS3: 7.4
github
около 1 года назад

CRI-O: Maliciously structured checkpoint file can gain arbitrary node access

EPSS

Процентиль: 49%
0.00262
Низкий

7.4 High

CVSS3