CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
References
Link Resource
http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2024/02/01/1 Mailing List
http://www.openwall.com/lists/oss-security/2024/02/02/3 Mailing List
https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf Patch
https://github.com/opencontainers/runc/releases/tag/v1.1.12 Release Notes
https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ Mailing List
http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2024/02/01/1 Mailing List
http://www.openwall.com/lists/oss-security/2024/02/02/3 Mailing List
https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf Patch
https://github.com/opencontainers/runc/releases/tag/v1.1.12 Release Notes
https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ Mailing List
https://www.vicarius.io/vsociety/posts/leaky-vessels-part-1-cve-2024-21626
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:54

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/leaky-vessels-part-1-cve-2024-21626 -
References () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List
References () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch
References () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes
References () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html - () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List

19 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html -

11 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ -

09 Feb 2024, 15:38

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
First Time Linuxfoundation
Fedoraproject fedora
Fedoraproject
Linuxfoundation runc
References () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2024/02/01/1 - () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/02/02/3 - () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List
References () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch
References () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes
References () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List

06 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ -

05 Feb 2024, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html -

01 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/01/1 -

31 Jan 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 22:15

Updated : 2024-11-21 08:54


NVD link : CVE-2024-21626

Mitre link : CVE-2024-21626

CVE.ORG link : CVE-2024-21626


JSON object : View

Products Affected

linuxfoundation

  • runc

fedoraproject

  • fedora
CWE
CWE-403

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')

CWE-668

Exposure of Resource to Wrong Sphere