A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesnt have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat OpenShift Container Platform 4.15 | RedHat | cri-o-0:1.28.11-7.rhaos4.15.gitc4c0556.el8 | * |
Red Hat OpenShift Container Platform 4.16 | RedHat | cri-o-0:1.29.11-3.rhaos4.16.git16d9bd6.el8 | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.