CVE-2024-8676

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.
Configurations

No configuration.

History

03 Apr 2025, 11:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:3297 -

04 Mar 2025, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:1908 -

29 Jan 2025, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0648 -

17 Dec 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHBA-2024:10826 -

Information

Published : 2024-11-26 20:15

Updated : 2025-04-03 11:15


NVD link : CVE-2024-8676

Mitre link : CVE-2024-8676

CVE.ORG link : CVE-2024-8676


JSON object : View

Products Affected

No product.

CWE
CWE-285

Improper Authorization