Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-21626
HistoryJan 31, 2024 - 12:00 a.m.

CVE-2024-21626

2024-01-3100:00:00
ubuntu.com
ubuntu.com
8
runc
oci specification
container escape

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.051 Low

EPSS

Percentile

92.9%

runc is a CLI tool for spawning and running containers on Linux according
to the OCI specification. In runc 1.1.11 and earlier, due to an internal
file descriptor leak, an attacker could cause a newly-spawned container
process (from runc exec) to have a working directory in the host filesystem
namespace, allowing for a container escape by giving access to the host
filesystem (“attack 2”). The same attack could be used by a malicious image
to allow a container process to gain access to the host filesystem through
runc run (“attack 1”). Variants of attacks 1 and 2 could be also be used to
overwrite semi-arbitrary host binaries, allowing for complete container
escapes (“attack 3a” and “attack 3b”). runc 1.1.12 includes patches for
this issue.

Notes

Author Note
Priority reason: Allows an attacker to escape containers
0xnishit affected versions >=v1.0.0-rc93,<=1.1.11
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchrunc< 1.1.4-0ubuntu1~18.04.2+esm1UNKNOWN
ubuntu20.04noarchrunc< 1.1.7-0ubuntu1~20.04.2UNKNOWN
ubuntu22.04noarchrunc< 1.1.7-0ubuntu1~22.04.2UNKNOWN
ubuntu23.10noarchrunc< 1.1.7-0ubuntu2.2UNKNOWN
ubuntu24.04noarchrunc< anyUNKNOWN

8.6 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

4.4 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

0.051 Low

EPSS

Percentile

92.9%