### [CVE-2024-21626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626) ![](https://img.shields.io/static/v1?label=Product&message=runc&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3Dv1.0.0-rc93%2C%20%3C%201.1.12%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-403%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20('File%20Descriptor%20Leak')&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere&color=brighgreen) ### Description runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. ### POC #### Reference - http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html #### Github - https://github.com/20142995/sectool - https://github.com/AMH-glitch/CHWA-LB-IDSDATASET - https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset - https://github.com/EGI-Federation/SVG-advisories - https://github.com/FlojBoj/CVE-2024-21626 - https://github.com/GhostTroops/TOP - https://github.com/KubernetesBachelor/CVE-2024-21626 - https://github.com/Maissacrement/cyber_sec_master_spv - https://github.com/Metarget/metarget - https://github.com/NitroCao/CVE-2024-21626 - https://github.com/R3DRUN3/R3DRUN3 - https://github.com/R4mbb/CVE-2024-21626-PoC - https://github.com/Sk3pper/CVE-2024-21626 - https://github.com/Sk3pper/CVE-2024-21626-old-docker-versions - https://github.com/SrcVme50/Runner - https://github.com/Threekiii/CVE - https://github.com/V0WKeep3r/CVE-2024-21626-runcPOC - https://github.com/Wall1e/CVE-2024-21626-POC - https://github.com/abian2/CVE-2024-21626 - https://github.com/adaammmeeee/little-joke - https://github.com/alban/runc-vuln-detector - https://github.com/alban/runc-vuln-gadget - https://github.com/aneasystone/github-trending - https://github.com/anik-chy/Final-project-6130 - https://github.com/bfengj/Cloud-Security - https://github.com/cdxiaodong/CVE-2024-21626 - https://github.com/chrisregy23/A-Comprehensive-Approach-to-Container-Security - https://github.com/chrisregy23/Container-Security - https://github.com/dorser/cve-2024-21626 - https://github.com/ecomtech-oss/pisc - https://github.com/fireinrain/github-trending - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/jafshare/GithubTrending - https://github.com/jiayy/android_vuln_poc-exp - https://github.com/k8sstormcenter/honeycluster - https://github.com/laysakura/CVE-2024-21626-demo - https://github.com/laysakura/resume-jp - https://github.com/mightysai1997/leaky-vessels-dynamic-detector - https://github.com/mmedhat1910/masters-testing-apps - https://github.com/nclsbayona/leaky-vessels - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/opencontainers-sec/go-containersec - https://github.com/rpinuaga/atomic-container - https://github.com/samokat-oss/pisc - https://github.com/securitycipher/daily-bugbounty-writeups - https://github.com/snyk/leaky-vessels-dynamic-detector - https://github.com/snyk/leaky-vessels-static-detector - https://github.com/ssst0n3/c-listener - https://github.com/ssst0n3/fd-listener - https://github.com/tanjiti/sec_profile - https://github.com/tarihub/offlinepost - https://github.com/zhangguanzhang/CVE-2024-21626 - https://github.com/zhanpengliu-tencent/medium-cve - https://github.com/zhaoolee/garss - https://github.com/zpxlz/CVE-2024-21626-POC - https://github.com/zulloper/cve-poc