Логотип exploitDog
bind:CVE-2024-21626
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-21626

Количество 18

Количество 18

ubuntu логотип

CVE-2024-21626

больше 1 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2024-21626

больше 1 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2024-21626

больше 1 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
EPSS: Низкий
msrc логотип

CVE-2024-21626

больше 1 года назад

GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds

EPSS: Низкий
debian логотип

CVE-2024-21626

больше 1 года назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 8.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0459-1

больше 1 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0328-1

больше 1 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0295-1

больше 1 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0294-1

больше 1 года назад

Security update for runc

EPSS: Низкий
github логотип

GHSA-xr7r-f8xq-vfvv

больше 1 года назад

runc vulnerable to container breakout through process.cwd trickery and leaked fds

CVSS3: 8.6
EPSS: Низкий
oracle-oval логотип

ELSA-2024-17931

больше 1 года назад

ELSA-2024-17931: runc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12148

больше 1 года назад

ELSA-2024-12148: runc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0752

больше 1 года назад

ELSA-2024-0752: container-tools:ol8 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0670

больше 1 года назад

ELSA-2024-0670: runc security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-00973

больше 1 года назад

Уязвимость инструмента для запуска изолированных контейнеров Runc связана с недостатками разграничений контролируемой области системы, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0074-1

4 месяца назад

Security update for crun

EPSS: Низкий
redos логотип

ROS-20240410-18

около 1 года назад

Уязвимость runc

CVSS3: 8.6
EPSS: Низкий
oracle-oval логотип

ELSA-2024-0748

больше 1 года назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
6%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
6%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

CVSS3: 8.6
6%
Низкий
больше 1 года назад
msrc логотип
CVE-2024-21626

GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds

6%
Низкий
больше 1 года назад
debian логотип
CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 8.6
6%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0459-1

Security update for runc

6%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0328-1

Security update for runc

6%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0295-1

Security update for runc

6%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0294-1

Security update for runc

6%
Низкий
больше 1 года назад
github логотип
GHSA-xr7r-f8xq-vfvv

runc vulnerable to container breakout through process.cwd trickery and leaked fds

CVSS3: 8.6
6%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-17931

ELSA-2024-17931: runc security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12148

ELSA-2024-12148: runc security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-0752

ELSA-2024-0752: container-tools:ol8 security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-0670

ELSA-2024-0670: runc security update (IMPORTANT)

больше 1 года назад
fstec логотип
BDU:2024-00973

Уязвимость инструмента для запуска изолированных контейнеров Runc связана с недостатками разграничений контролируемой области системы, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.6
6%
Низкий
больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:0074-1

Security update for crun

4 месяца назад
redos логотип
ROS-20240410-18

Уязвимость runc

CVSS3: 8.6
6%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-0748

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

больше 1 года назад

Уязвимостей на страницу