Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 02 Jul 2025 08:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 01 May 2025 08:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 03 Apr 2025 10:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.17::el9 | |
| References |  | 
Tue, 04 Mar 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.18::el8 cpe:/a:redhat:openshift:4.18::el9 | |
| References |  | 
Wed, 29 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.15::el8 cpe:/a:redhat:openshift:4.15::el9 | |
| References |  | 
Tue, 17 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.16::el9 | |
| References |  | 
Mon, 16 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:openshift:4.16::el8 | 
Wed, 27 Nov 2024 01:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Tue, 26 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 26 Nov 2024 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn't have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore. | |
| Title | Cri-o: checkpoint restore can be triggered from different namespaces | |
| First Time appeared | Redhat Redhat enterprise Linux Redhat openshift | |
| Weaknesses | CWE-285 | |
| CPEs | cpe:/a:redhat:openshift:3.11 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux Redhat openshift | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: redhat
Published: 2024-11-26T19:15:48.475Z
Updated: 2025-09-12T20:07:24.548Z
Reserved: 2024-09-10T19:56:52.932Z
Link: CVE-2024-8676
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-11-26T21:01:41.343Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-11-26T20:15:34.260
Modified: 2025-07-02T09:15:24.243
Link: CVE-2024-8676
 Redhat
                        Redhat