Логотип exploitDog
bind:"BDU:2024-06891" OR bind:"CVE-2024-45310"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-06891" OR bind:"CVE-2024-45310"

Количество 11

Количество 11

fstec логотип

BDU:2024-06891

11 месяцев назад

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с состоянием гонки, разрешающим отслеживание ссылок, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 3.6
EPSS: Низкий
redos логотип

ROS-20241001-06

9 месяцев назад

Уязвимость runc

CVSS3: 3.6
EPSS: Низкий
ubuntu логотип

CVE-2024-45310

10 месяцев назад

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed i...

CVSS3: 3.6
EPSS: Низкий
redhat логотип

CVE-2024-45310

10 месяцев назад

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed i...

CVSS3: 3.6
EPSS: Низкий
nvd логотип

CVE-2024-45310

10 месяцев назад

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in r

CVSS3: 3.6
EPSS: Низкий
msrc логотип

CVE-2024-45310

6 месяцев назад

CVSS3: 3.6
EPSS: Низкий
debian логотип

CVE-2024-45310

10 месяцев назад

runc is a CLI tool for spawning and running containers according to th ...

CVSS3: 3.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1374-1

2 месяца назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3324-1

9 месяцев назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3222-1

10 месяцев назад

Security update for runc

EPSS: Низкий
github логотип

GHSA-jfvp-7x6p-h2pv

10 месяцев назад

runc can be confused to create empty files/directories on the host

CVSS3: 3.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-06891

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с состоянием гонки, разрешающим отслеживание ссылок, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 3.6
0%
Низкий
11 месяцев назад
redos логотип
ROS-20241001-06

Уязвимость runc

CVSS3: 3.6
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2024-45310

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed i...

CVSS3: 3.6
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-45310

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed i...

CVSS3: 3.6
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-45310

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in r

CVSS3: 3.6
0%
Низкий
10 месяцев назад
msrc логотип
CVSS3: 3.6
0%
Низкий
6 месяцев назад
debian логотип
CVE-2024-45310

runc is a CLI tool for spawning and running containers according to th ...

CVSS3: 3.6
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1374-1

Security update for runc

0%
Низкий
2 месяца назад
suse-cvrf логотип
SUSE-SU-2024:3324-1

Security update for runc

0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3222-1

Security update for runc

0%
Низкий
10 месяцев назад
github логотип
GHSA-jfvp-7x6p-h2pv

runc can be confused to create empty files/directories on the host

CVSS3: 3.6
0%
Низкий
10 месяцев назад

Уязвимостей на страницу