Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Go Package: github.com/opencontainers/runc 1.0.0-rc93 < 1.1.12 - Local Sandbox Bypass Vulnerability #656

Closed
SM-Software opened this issue Apr 17, 2024 · 1 comment

Comments

@SM-Software
Copy link

Description

Description:
Due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). [https://github.com/advisories/https://github.com/advisories/https://github.com/advisories/GHSA-xr7r-f8xq-vfvv] Vendor Affected Components: Go Package: github.com/opencontainers/runc 1.0.0-rc93 ≤ 1.1.11

CERT Recommendation:
Update Go Package: github.com/opencontainers/runc to version 1.1.12 or later.

Vendor Advisories:
Vulnerability 1 | Advisory: GHSA-xr7r-f8xq-vfvv | several container breakouts due to internally leaked fds Vulnerability 1 | Release | 1.1.12 Vulnerability 1 | Fix Commit | Merge pull request from GHSA-xr7r-f8xq-vfvv

CVEs:
GHSA-xr7r-f8xq-vfvv

@elezar
Copy link
Member

elezar commented Apr 17, 2024

We don't import the github.com/opencontainers/runc module.

@elezar elezar closed this as completed Apr 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants