RunC Flaws Enable Container Escapes, Granting Attackers Host Access

RunC Flaws Enable Container Escapes, Granting Attackers Host Access

January 31, 2024 at 03:40PM

Multiple security vulnerabilities in the runC command line tool have been disclosed, known as Leaky Vessels. These vulnerabilities could allow threat actors to escape container boundaries and launch further attacks, potentially accessing sensitive data and superuser privileges. The flaws have been addressed in runC version 1.1.12, and users are advised to update their container runtime environments.

Key takeaways from the meeting notes:

– Multiple security vulnerabilities in the runC command line tool have been disclosed, allowing threat actors to escape the bounds of the container and stage follow-on attacks.
– The vulnerabilities, tracked as CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653, have been collectively dubbed Leaky Vessels by cybersecurity vendor Snyk.
– runC, a tool for spawning and running containers on Linux, has been impacted, and the vulnerabilities have been addressed in runC version 1.1.12 released today.
– The most severe flaw is CVE-2024-21626, which could result in a container escape centered around the `WORKDIR` command.
– Snyk strongly recommends that users check for updates from vendors providing their container runtime environments, including Docker, Kubernetes vendors, cloud container services, and open source communities.

Please let me know if you need more information or further assistance.

Full Article