mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
4.1 KiB
4.1 KiB
CVE-2024-21626
Description
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
POC
Reference
Github
- https://github.com/20142995/sectool
- https://github.com/AMH-glitch/CHWA-LB-IDSDATASET
- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/FlojBoj/CVE-2024-21626
- https://github.com/GhostTroops/TOP
- https://github.com/KubernetesBachelor/CVE-2024-21626
- https://github.com/Maissacrement/cyber_sec_master_spv
- https://github.com/Metarget/metarget
- https://github.com/NitroCao/CVE-2024-21626
- https://github.com/R3DRUN3/R3DRUN3
- https://github.com/R4mbb/CVE-2024-21626-PoC
- https://github.com/Sk3pper/CVE-2024-21626
- https://github.com/Sk3pper/CVE-2024-21626-old-docker-versions
- https://github.com/SrcVme50/Runner
- https://github.com/Threekiii/CVE
- https://github.com/V0WKeep3r/CVE-2024-21626-runcPOC
- https://github.com/Wall1e/CVE-2024-21626-POC
- https://github.com/abian2/CVE-2024-21626
- https://github.com/adaammmeeee/little-joke
- https://github.com/alban/runc-vuln-detector
- https://github.com/alban/runc-vuln-gadget
- https://github.com/aneasystone/github-trending
- https://github.com/anik-chy/Final-project-6130
- https://github.com/bfengj/Cloud-Security
- https://github.com/cdxiaodong/CVE-2024-21626
- https://github.com/chrisregy23/A-Comprehensive-Approach-to-Container-Security
- https://github.com/chrisregy23/Container-Security
- https://github.com/dorser/cve-2024-21626
- https://github.com/ecomtech-oss/pisc
- https://github.com/fireinrain/github-trending
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/jafshare/GithubTrending
- https://github.com/jiayy/android_vuln_poc-exp
- https://github.com/k8sstormcenter/honeycluster
- https://github.com/laysakura/CVE-2024-21626-demo
- https://github.com/laysakura/resume-jp
- https://github.com/mightysai1997/leaky-vessels-dynamic-detector
- https://github.com/mmedhat1910/masters-testing-apps
- https://github.com/nclsbayona/leaky-vessels
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/opencontainers-sec/go-containersec
- https://github.com/rpinuaga/atomic-container
- https://github.com/samokat-oss/pisc
- https://github.com/securitycipher/daily-bugbounty-writeups
- https://github.com/snyk/leaky-vessels-dynamic-detector
- https://github.com/snyk/leaky-vessels-static-detector
- https://github.com/ssst0n3/c-listener
- https://github.com/ssst0n3/fd-listener
- https://github.com/tanjiti/sec_profile
- https://github.com/tarihub/offlinepost
- https://github.com/zhangguanzhang/CVE-2024-21626
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zhaoolee/garss
- https://github.com/zpxlz/CVE-2024-21626-POC
- https://github.com/zulloper/cve-poc