vulnerability

Red Hat: CVE-2024-21626: runc: file descriptor leak (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2024-01-31
Added
2024-02-06
Modified
2025-03-17

Description

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

Solution(s)

redhat-upgrade-aardvark-dnsredhat-upgrade-buildahredhat-upgrade-buildah-debuginforedhat-upgrade-buildah-debugsourceredhat-upgrade-buildah-testsredhat-upgrade-buildah-tests-debuginforedhat-upgrade-cockpit-podmanredhat-upgrade-conmonredhat-upgrade-conmon-debuginforedhat-upgrade-conmon-debugsourceredhat-upgrade-container-selinuxredhat-upgrade-containernetworking-pluginsredhat-upgrade-containernetworking-plugins-debuginforedhat-upgrade-containernetworking-plugins-debugsourceredhat-upgrade-containers-commonredhat-upgrade-critredhat-upgrade-criuredhat-upgrade-criu-debuginforedhat-upgrade-criu-debugsourceredhat-upgrade-criu-develredhat-upgrade-criu-libsredhat-upgrade-criu-libs-debuginforedhat-upgrade-crunredhat-upgrade-crun-debuginforedhat-upgrade-crun-debugsourceredhat-upgrade-fuse-overlayfsredhat-upgrade-fuse-overlayfs-debuginforedhat-upgrade-fuse-overlayfs-debugsourceredhat-upgrade-libslirpredhat-upgrade-libslirp-debuginforedhat-upgrade-libslirp-debugsourceredhat-upgrade-libslirp-develredhat-upgrade-netavarkredhat-upgrade-oci-seccomp-bpf-hookredhat-upgrade-oci-seccomp-bpf-hook-debuginforedhat-upgrade-oci-seccomp-bpf-hook-debugsourceredhat-upgrade-podmanredhat-upgrade-podman-catatonitredhat-upgrade-podman-catatonit-debuginforedhat-upgrade-podman-debuginforedhat-upgrade-podman-debugsourceredhat-upgrade-podman-dockerredhat-upgrade-podman-gvproxyredhat-upgrade-podman-gvproxy-debuginforedhat-upgrade-podman-pluginsredhat-upgrade-podman-plugins-debuginforedhat-upgrade-podman-remoteredhat-upgrade-podman-remote-debuginforedhat-upgrade-podman-testsredhat-upgrade-python3-criuredhat-upgrade-python3-podmanredhat-upgrade-runcredhat-upgrade-runc-debuginforedhat-upgrade-runc-debugsourceredhat-upgrade-skopeoredhat-upgrade-skopeo-debuginforedhat-upgrade-skopeo-debugsourceredhat-upgrade-skopeo-testsredhat-upgrade-slirp4netnsredhat-upgrade-slirp4netns-debuginforedhat-upgrade-slirp4netns-debugsourceredhat-upgrade-toolboxredhat-upgrade-toolbox-debuginforedhat-upgrade-toolbox-debugsourceredhat-upgrade-toolbox-testsredhat-upgrade-udica
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.