CVE-2024-22036

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-22036
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-22036.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-22036
Aliases
Related
Published
2025-04-16T09:15:27Z
Modified
2025-04-17T04:04:48.609432Z
Summary
[none]
Details

A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot jail and gain root access to the Rancher container itself. In production environments, further privilege escalation is possible based on living off the land within the Rancher container itself. For the test and development environments, based on a –privileged Docker container, it is possible to escape the Docker container and gain execution access on the host system.

This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3.

References

Affected packages

Git / github.com/rancher/rancher

Affected ranges

Type
GIT
Repo
https://github.com/rancher/rancher
Events

Affected versions

v2.*

v2.7.0
v2.7.0-novkdm
v2.7.11
v2.7.11-alpha1
v2.7.11-alpha2
v2.7.11-alpha3
v2.7.11-rc1
v2.7.11-rc2
v2.7.11-rc3
v2.7.11-rc4
v2.7.11-rc5
v2.7.12
v2.7.12-alpha1
v2.7.12-alpha2
v2.7.12-rc1
v2.7.12-rc2
v2.7.12-rc3
v2.7.13
v2.7.13-alpha1
v2.7.13-rc1
v2.7.13-rc2
v2.7.13-rc3
v2.7.13-rc4
v2.7.13-rc5
v2.7.16-alpha1
v2.7.16-alpha2
v2.7.16-alpha3
v2.7.16-alpha4
v2.7.16-alpha5
v2.7.16-rc1
v2.7.16-rc2
v2.7.2
v2.7.2-rc1
v2.7.2-rc10
v2.7.2-rc2
v2.7.2-rc3
v2.7.2-rc4
v2.7.2-rc5
v2.7.2-rc6
v2.7.2-rc7
v2.7.2-rc8
v2.7.2-rc9
v2.7.5
v2.7.5-rc1
v2.7.5-rc2
v2.7.5-rc3
v2.7.5-rc4
v2.7.5-rc5
v2.7.5-rc6
v2.7.7
v2.7.7-rc1
v2.7.7-rc2
v2.7.7-rc3
v2.7.7-rc4
v2.7.7-rc5
v2.7.7-rc6
v2.7.7-rc7
v2.7.8
v2.7.8-rc1
v2.7.9
v2.7.9-rc1
v2.7.9-rc2