8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.051 Low
EPSS
Percentile
92.8%
Package : runc
Version : 1.0.0~rc6+dfsg1-3+deb10u3
CVE ID : CVE-2021-43784 CVE-2024-21626
Debian Bug :
runc is a command line client for running applications packaged according
to the Open Container Format (OCF) and is a compliant implementation of
the Open Container Project specification.
CVE-2021-43784
A flaw has been detected that may lead to a possible length field
overflow, allowing user-controlled data to be parsed as control
characters.
CVE-2024-21626
A flaw has been detected which allows several container breakouts
due to internally leaked file descriptors. The patch includes fixes
and hardening measurements against these types of issues/attacks.
For Debian 10 buster, these problems have been fixed in version
1.0.0~rc6+dfsg1-3+deb10u3.
We recommend that you upgrade your runc packages.
For the detailed security status of runc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/runc
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | ppc64el | runc | < 1.1.5+ds1-1+deb12u1 | runc_1.1.5+ds1-1+deb12u1_ppc64el.deb |
Debian | 11 | i386 | runc-dbgsym | < 1.0.0~rc93+ds1-5+deb11u3 | runc-dbgsym_1.0.0~rc93+ds1-5+deb11u3_i386.deb |
Debian | 11 | mipsel | runc-dbgsym | < 1.0.0~rc93+ds1-5+deb11u3 | runc-dbgsym_1.0.0~rc93+ds1-5+deb11u3_mipsel.deb |
Debian | 11 | mipsel | runc | < 1.0.0~rc93+ds1-5+deb11u3 | runc_1.0.0~rc93+ds1-5+deb11u3_mipsel.deb |
Debian | 10 | all | golang-github-opencontainers-runc-dev | < 1.0.0~rc6+dfsg1-3+deb10u3 | golang-github-opencontainers-runc-dev_1.0.0~rc6+dfsg1-3+deb10u3_all.deb |
Debian | 12 | armhf | runc-dbgsym | < 1.1.5+ds1-1+deb12u1 | runc-dbgsym_1.1.5+ds1-1+deb12u1_armhf.deb |
Debian | 12 | mips64el | runc | < 1.1.5+ds1-1+deb12u1 | runc_1.1.5+ds1-1+deb12u1_mips64el.deb |
Debian | 11 | all | runc | < 1.0.0~rc93+ds1-5+deb11u3 | runc_1.0.0~rc93+ds1-5+deb11u3_all.deb |
Debian | 12 | arm64 | runc-dbgsym | < 1.1.5+ds1-1+deb12u1 | runc-dbgsym_1.1.5+ds1-1+deb12u1_arm64.deb |
Debian | 12 | amd64 | runc-dbgsym | < 1.1.5+ds1-1+deb12u1 | runc-dbgsym_1.1.5+ds1-1+deb12u1_amd64.deb |
8.6 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.051 Low
EPSS
Percentile
92.8%