• CVE-2024-21626

发布时间: 2024年2月23日

修改时间: 2024年10月31日

概要

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ( attack 2 ). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ( attack 1 ). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ( attack 3a and attack 3b ). runc 1.1.12 includes patches for this issue.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Local Local
CVSS评分 8.6 8.6
Attack Complexity Low Low
Privileges Required None None
Scope Changed Changed
Integrity High High
User Interaction Required Required
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1483 runc security update 2024年2月23日

影响产品

产品 状态
KY3.4-4A runc Fixed
KY3.4-5A runc Fixed
KY3.5.1 runc Fixed
KY3.5.2 runc Fixed