Race Condition Enabling Link Following Affecting github.com/opencontainers/runc/libcontainer package, versions <1.1.14>=1.2.0-rc.1 <1.2.0-rc.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINER-7856944
  • published3 Sept 2024
  • disclosed3 Sept 2024
  • creditRodrigo Campos Catelin, Alban Crequy

Introduced: 3 Sep 2024

CVE-2024-45310  (opens in a new tab)
CWE-363  (opens in a new tab)

How to fix?

Upgrade github.com/opencontainers/runc/libcontainer to version 1.1.14, 1.2.0-rc.3 or higher.

Overview

github.com/opencontainers/runc/libcontainer is a package for a modern container runtime.

Affected versions of this package are vulnerable to Race Condition Enabling Link Following via the os.MkdirAll function due to inadvertently following symlinks. An attacker could create empty files or directories on a host system when sharing a volume between containers.

Notes:

  1. An attacker must have the ability to start containers using some kind of custom volume configuration.

  2. This vulnerability can not cause data loss, file deletion or truncation of existing files.

Workaround

This can be mitigated by using user namespaces, SELinux, or AppArmor policies.

CVSS Scores

version 4.0
version 3.1