发布时间: 2024年2月23日
修改时间: 2024年10月31日
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ( attack 2 ). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ( attack 1 ). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ( attack 3a and attack 3b ). runc 1.1.12 includes patches for this issue.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 8.6 | 8.6 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Changed | Changed |
Integrity | High | High |
User Interaction | Required | Required |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1483 | runc security update | 2024年2月23日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | runc | Fixed |
KY3.4-5A | runc | Fixed |
KY3.5.1 | runc | Fixed |
KY3.5.2 | runc | Fixed |