tt9133github / kubernetes

Production-Grade Container Scheduling and Management
https://kubernetes.io
Apache License 2.0
0 stars 0 forks source link

CVE-2024-21626 (High) detected in github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9, github.com/opencontainers/runc-v1.0.0-rc9 #179

Open mend-bolt-for-github[bot] opened 5 months ago

mend-bolt-for-github[bot] commented 5 months ago

CVE-2024-21626 - High Severity Vulnerability

Vulnerable Libraries - github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9, github.com/opencontainers/runc-v1.0.0-rc9

github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy: - :x: **github.com/opencontainers/runc/libcontainer/utils-v1.0.0-rc9** (Vulnerable Library)

github.com/opencontainers/runc-v1.0.0-rc9

CLI tool for spawning and running containers according to the OCI specification

Library home page: https://proxy.golang.org/github.com/opencontainers/runc/@v/v1.0.0-rc9.zip

Dependency Hierarchy: - github.com/google/cadvisor/container/common-v0.35.0 (Root Library) - github.com/google/cadvisor/container-v0.35.0 - github.com/google/cadvisor/container/docker-v0.35.0 - github.com/google/cadvisor/container/libcontainer-v0.35.0 - :x: **github.com/opencontainers/runc-v1.0.0-rc9** (Vulnerable Library)

Found in HEAD commit: 6e30df8c07a51f900077867824d3807dffb18045

Found in base branch: master

Vulnerability Details

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

Publish Date: 2024-01-31

URL: CVE-2024-21626

CVSS 3 Score Details (8.6)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv

Release Date: 2024-01-31

Fix Resolution: v1.1.12


Step up your Open Source Security Game with Mend here