CVE-2024-21626 (High) detected in github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9, github.com/opencontainers/runc-v1.0.0-rc9 #179
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2024-21626 - High Severity Vulnerability
Vulnerable Libraries - github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9, github.com/opencontainers/runc-v1.0.0-rc9
github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9
CLI tool for spawning and running containers according to the OCI specification
Dependency Hierarchy:
github.com/opencontainers/runc-v1.0.0-rc9
CLI tool for spawning and running containers according to the OCI specification
Library home page: https://proxy.golang.org/github.com/opencontainers/runc/@v/v1.0.0-rc9.zip
Dependency Hierarchy:
Found in HEAD commit: 6e30df8c07a51f900077867824d3807dffb18045
Found in base branch: master
Vulnerability Details
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
Publish Date: 2024-01-31
URL: CVE-2024-21626
CVSS 3 Score Details (8.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-xr7r-f8xq-vfvv
Release Date: 2024-01-31
Fix Resolution: v1.1.12
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: