CVE-2024-8676 : RED HAT ENTERPRISE LINUX/OPENSHIFT CONTAINER PLATFORM CRI-O IMPROPER AUTHORIZATION

Description

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn’t have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

References

https://access.redhat.com/security/cve/CVE-2024-8676

https://bugzilla.redhat.com/show_bug.cgi?id=2313842

For More Information

CVERecord

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-31976 : ENGENIUS EWS356-FIR UP TO 1.1.30 CONTROLLER CONNECTIVITY OS COMMAND INJECTION

CVE-2024-31976 : ENGENIUS EWS356-FIR UP TO 1.1.30 CONTROLLER CONNECTIVITY OS COMMAND INJECTION

Description EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity

CVE-2024-42327 : ZABBIX UP TO 6.0.31/6.4.16/7.0.1 API ADDRELATED OBJECTS SQL INJECTION

CVE-2024-42327 : ZABBIX UP TO 6.0.31/6.4.16/7.0.1 API ADDRELATED OBJECTS SQL INJECTION

Description A non-admin user account on the Zabbix frontend with the default User role, or with any other role that

CVE-2024-11667 : Zyxel ATP/USG FLEX/USG FLEX 50(W)/USG20(W)-VPN UP TO 5.38 URL PATH TRAVERSAL

CVE-2024-11667 : Zyxel ATP/USG FLEX/USG FLEX 50(W)/USG20(W)-VPN UP TO 5.38 URL PATH TRAVERSAL

Description A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG