Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/cri-o/cri-o
  4. ›
  5. CVE-2024-8676

CVE-2024-8676: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access

November 26, 2024 (updated May 1, 2025)

A vulnerability was found in CRI-O, where it can be requested to take a checkpoint archive of a container and later be asked to restore it. When it does that restoration, it attempts to restore the mounts from the restore archive instead of the pod request. As a result, the validations run on the pod spec, verifying that the pod has access to the mounts it specifies are not applicable to a restored container. This flaw allows a malicious user to trick CRI-O into restoring a pod that doesn’t have access to host mounts. The user needs access to the kubelet or cri-o socket to call the restore endpoint and trigger the restore.

References

  • access.redhat.com/errata/RHBA-2024:10826
  • access.redhat.com/errata/RHSA-2025:0648
  • access.redhat.com/errata/RHSA-2025:1908
  • access.redhat.com/errata/RHSA-2025:3297
  • access.redhat.com/errata/RHSA-2025:4211
  • access.redhat.com/security/cve/CVE-2024-8676
  • bugzilla.redhat.com/show_bug.cgi?id=2313842
  • github.com/advisories/GHSA-7p9f-6x8j-gxxp
  • github.com/cri-o/cri-o
  • github.com/cri-o/cri-o/commit/e8e7dcb7838d11b5157976bf3e31a5840bb77de7
  • github.com/cri-o/cri-o/security/advisories/GHSA-7p9f-6x8j-gxxp
  • nvd.nist.gov/vuln/detail/CVE-2024-8676

Code Behaviors & Features

Detect and mitigate CVE-2024-8676 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.29.11, all versions starting from 1.30.0 before 1.30.8, all versions starting from 1.31.0 before 1.31.3

Fixed versions

  • 1.29.11
  • 1.30.8
  • 1.31.3

Solution

Upgrade to versions 1.29.11, 1.30.8, 1.31.3 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization

Source file

go/github.com/cri-o/cri-o/CVE-2024-8676.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:43 +0000.