Skip to content

alban/runc-vuln-detector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Artifact Hub

runc-vuln-detector

This gadget detects when the following runc vulnerability is exploited and blocks its usage.

CVE-2024-21626

How to use

Thanks to CVE-2024-21626, a container workload can access the host filesystem:

$ docker run -ti --rm --workdir=/proc/self/fd/9 ubuntu grep ^ID= ../../../etc/os-release
ID=fedora

runc-vuln-detector is able to detect and block CVE-2024-21626:

$ IG_EXPERIMENTAL=true sudo -E ig run ghcr.io/alban/runc-vuln-detector:latest
INFO[0000] Experimental features enabled
RUNTIME.CONTAINERNAME MNTNS_ID   PID    COMM          PATH
                      4026533066 409484 runc:[2:INIT] /proc/self/fd/9
$ docker run -ti --rm --workdir=/proc/self/fd/9 ubuntu grep ^ID= ../../../etc/os-release
docker: Error response from daemon: cannot start a stopped process: unknown.

Limitations

This gadget is for demonstration only and not designed for real-world security. Malicious software can easily bypass its detection capabilities.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published