5
CVSSv3

CVE-2021-43784

Published: 06/12/2021 Updated: 19/02/2024
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 5 | Impact Score: 3.4 | Exploitability Score: 1.6
VMScore: 535
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc before 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the malicious user to have some control over the configuration of the container and would allow the malicious user to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the malicious user to disable namespace protections entirely even in the absence of this bug.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation runc

debian debian linux 9.0

Vendor Advisories

Synopsis Moderate: runc security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for runc is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a security ...
In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers) In all versions of runc prior to 103, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte ar ...