runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
References
Configurations
History
21 Nov 2024, 08:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List | |
References | () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch | |
References | () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes | |
References | () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List |
19 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 15:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* |
|
First Time |
Linuxfoundation
Fedoraproject fedora Fedoraproject Linuxfoundation runc |
|
References | () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List | |
References | () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch | |
References | () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes | |
References | () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List |
06 Feb 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Feb 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-31 22:15
Updated : 2024-11-21 08:54
NVD link : CVE-2024-21626
Mitre link : CVE-2024-21626
CVE.ORG link : CVE-2024-21626
JSON object : View
Products Affected
linuxfoundation
- runc
fedoraproject
- fedora