PT-2024-1467 · Runc+12 · Runc+12
Cyphar
+2
·
Published
2023-11-07
·
Updated
2026-03-15
·
CVE-2024-21626
CVSS v3.1
8.6
| Vector | AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
runc versions 1.1.11 and earlier
Description
The issue is related to an internal file descriptor leak in runc, which allows an attacker to cause a newly-spawned container process to have a working directory in the host filesystem namespace. This can lead to a container escape, giving access to the host filesystem. The same attack can be used by a malicious image to allow a container process to gain access to the host filesystem through runc run. Variants of these attacks can also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes. It is estimated that at least 80% of cloud environments are exposed to this issue.
Recommendations
For runc versions 1.1.11 and earlier, update to runc version 1.1.12 to address the issue. If you are using containerd, update to version 1.6.28 or 1.7.13, which include the patched runc version. For Docker, update to version 24.0.9 or 25.0.2. As a temporary workaround, consider restricting access to the vulnerable
process.cwd and process.args to minimize the risk of exploitation.Exploit
Fix
RCE
Exposure of Resource to Wrong Sphere
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Almalinux
Centos
Check Point Gaia
Docker
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
Kubernetes Containerd
Runc