runc is a CLI tool for spawning and running containers according to the OCI specification.
Security Fix(es):
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.(CVE-2024-21626)
{
"severity": "High"
}{
"aarch64": [
"docker-runc-1.0.0.rc3-321.oe2203.aarch64.rpm",
"docker-runc-1.1.3-23.oe2203sp1.aarch64.rpm",
"docker-runc-1.1.3-23.oe2203sp2.aarch64.rpm",
"runc-1.1.3-24.oe2203sp3.aarch64.rpm"
],
"src": [
"docker-runc-1.0.0.rc3-321.oe2203.src.rpm",
"docker-runc-1.1.3-23.oe2203sp1.src.rpm",
"docker-runc-1.1.3-23.oe2203sp2.src.rpm",
"runc-1.1.3-24.oe2203sp3.src.rpm"
],
"x86_64": [
"docker-runc-1.0.0.rc3-321.oe2203.x86_64.rpm",
"docker-runc-1.1.3-23.oe2203sp1.x86_64.rpm",
"docker-runc-1.1.3-23.oe2203sp2.x86_64.rpm",
"runc-1.1.3-24.oe2203sp3.x86_64.rpm"
]
}