CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

19 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html -

11 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ -

09 Feb 2024, 15:38

Type Values Removed Values Added
First Time Linuxfoundation
Linuxfoundation runc
Fedoraproject
Fedoraproject fedora
References () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2024/02/01/1 - () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/02/02/3 - () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List
References () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch
References () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes
References () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*

06 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ -

05 Feb 2024, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html -

02 Feb 2024, 12:15

Type Values Removed Values Added
Summary
  • (es) runc es una herramienta CLI para generar y ejecutar contenedores en Linux de acuerdo con la especificación OCI. En runc 1.1.11 y versiones anteriores, debido a una fuga interna de un descriptor de archivo, un atacante podría provocar que un proceso contenedor recién generado (de runc exec) tuviera un directorio de trabajo en el espacio de nombres del sistema de archivos del host, lo que permitiría un escape del contenedor al otorgar acceso. al sistema de archivos del host ("ataque 2"). El mismo ataque podría ser utilizado por una imagen maliciosa para permitir que un proceso contenedor obtenga acceso al sistema de archivos del host a través de runc run ("ataque 1"). Las variantes de los ataques 1 y 2 también podrían usarse para sobrescribir archivos binarios de host semiarbitrarios, permitiendo escapes completos de contenedores ("ataque 3a" y "ataque 3b"). runc 1.1.12 incluye parches para este problema.
References
  • () http://www.openwall.com/lists/oss-security/2024/02/02/3 -

01 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/01/1 -

31 Jan 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 22:15

Updated : 2024-02-19 03:15


NVD link : CVE-2024-21626

Mitre link : CVE-2024-21626

CVE.ORG link : CVE-2024-21626


JSON object : View

Products Affected

fedoraproject

  • fedora

linuxfoundation

  • runc
CWE
CWE-668

Exposure of Resource to Wrong Sphere

CWE-403

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')