Логотип exploitDog
bind:CVE-2024-8676
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-8676

Количество 5

Количество 5

ubuntu логотип

CVE-2024-8676

около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2024-8676

около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2024-8676

около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2024-8676

около 1 года назад

A vulnerability was found in CRI-O, where it can be requested to take ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-7p9f-6x8j-gxxp

около 1 года назад

CRI-O: Maliciously structured checkpoint file can gain arbitrary node access

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-8676

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-8676

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-8676

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

CVSS3: 7.4
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-8676

A vulnerability was found in CRI-O, where it can be requested to take ...

CVSS3: 7.4
0%
Низкий
около 1 года назад
github логотип
GHSA-7p9f-6x8j-gxxp

CRI-O: Maliciously structured checkpoint file can gain arbitrary node access

CVSS3: 7.4
0%
Низкий
около 1 года назад

Уязвимостей на страницу