CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

19 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html -

11 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/ -

09 Feb 2024, 15:38

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - () https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf - Patch
References () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - () https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv - Exploit, Vendor Advisory
References () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - () https://github.com/opencontainers/runc/releases/tag/v1.1.12 - Release Notes
References () http://www.openwall.com/lists/oss-security/2024/02/01/1 - () http://www.openwall.com/lists/oss-security/2024/02/01/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/02/02/3 - () http://www.openwall.com/lists/oss-security/2024/02/02/3 - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ - Mailing List
CWE CWE-403
First Time Fedoraproject
Linuxfoundation runc
Linuxfoundation
Fedoraproject fedora
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6

06 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/ -

05 Feb 2024, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html -

02 Feb 2024, 12:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/02/3 -

01 Feb 2024, 06:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/01/1 -

31 Jan 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 22:15

Updated : 2024-02-28 20:54


NVD link : CVE-2024-21626

Mitre link : CVE-2024-21626

CVE.ORG link : CVE-2024-21626


JSON object : View

Products Affected

linuxfoundation

  • runc

fedoraproject

  • fedora
CWE
CWE-668

Exposure of Resource to Wrong Sphere

CWE-403

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')