runc is a CLI tool for spawning and running containers according to the OCI specification.
Security Fix(es):
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.(CVE-2024-21626)
{ "severity": "High" }
{ "aarch64": [ "docker-runc-1.0.0.rc3-321.oe2203.aarch64.rpm", "docker-runc-1.1.3-23.oe2203sp1.aarch64.rpm", "docker-runc-1.1.3-23.oe2203sp2.aarch64.rpm", "runc-1.1.3-24.oe2203sp3.aarch64.rpm" ], "src": [ "docker-runc-1.0.0.rc3-321.oe2203.src.rpm", "docker-runc-1.1.3-23.oe2203sp1.src.rpm", "docker-runc-1.1.3-23.oe2203sp2.src.rpm", "runc-1.1.3-24.oe2203sp3.src.rpm" ], "x86_64": [ "docker-runc-1.0.0.rc3-321.oe2203.x86_64.rpm", "docker-runc-1.1.3-23.oe2203sp1.x86_64.rpm", "docker-runc-1.1.3-23.oe2203sp2.x86_64.rpm", "runc-1.1.3-24.oe2203sp3.x86_64.rpm" ] }