Source: runc
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for runc.

CVE-2024-45310[0]:
| runc is a CLI tool for spawning and running containers according to
| the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2
| and earlier, can be tricked into creating empty files or directories
| in arbitrary locations in the host filesystem by sharing a volume
| between two containers and exploiting a race with `os.MkdirAll`.
| While this could be used to create empty files, existing files would
| not be truncated. An attacker must have the ability to start
| containers using some kind of custom volume configuration.
| Containers using user namespaces are still affected, but the scope
| of places an attacker can create inodes can be significantly
| reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can
| also in principle block this attack -- we suspect the industry
| standard SELinux policy may restrict this attack's scope but the
| exact scope of protection hasn't been analysed. This is exploitable
| using runc directly as well as through Docker and Kubernetes. The
| issue is fixed in runc v1.1.14 and v1.2.0-rc3.  Some workarounds are
| available. Using user namespaces restricts this attack fairly
| significantly such that the attacker can only create inodes in
| directories that the remapped root user/group has write access to.
| Unless the root user is remapped to an actual user on the host (such
| as with rootless containers that don't use `/etc/sub[ug]id`), this
| in practice means that an attacker would only be able to create
| inodes in world-writable directories. A strict enough SELinux or
| AppArmor policy could in principle also restrict the scope if a
| specific label is applied to the runc runtime, though neither the
| extent to which the standard existing policies block this attack nor
| what exact policies are needed to sufficiently restrict this attack
| have been thoroughly tested.

https://www.openwall.com/lists/oss-security/2024/09/03/1
https://github.com/opencontainers/runc/security/advisories/GHSA-jfvp-7x6p-h2pv


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-45310
    https://www.cve.org/CVERecord?id=CVE-2024-45310

Please adjust the affected versions in the BTS as needed.

Reply via email to