Race Condition Enabling Link Following Affecting github.com/opencontainers/runc/libcontainer/system package, versions <1.1.14 >=1.2.0-rc.1 <1.2.0-rc.3
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINERSYSTEM-7856946
- published 3 Sep 2024
- disclosed 3 Sep 2024
- credit Rodrigo Campos Catelin, Alban Crequy
Introduced: 3 Sep 2024
CVE-2024-45310 Open this link in a new tabHow to fix?
Upgrade github.com/opencontainers/runc/libcontainer/system
to version 1.1.14, 1.2.0-rc.3 or higher.
Overview
Affected versions of this package are vulnerable to Race Condition Enabling Link Following via the os.MkdirAll
function due to inadvertently following symlinks. An attacker could create empty files or directories on a host system when sharing a volume between containers.
Notes:
An attacker must have the ability to start containers using some kind of custom volume configuration.
This vulnerability can not cause data loss, file deletion or truncation of existing files.
Workaround
This can be mitigated by using user namespaces, SELinux, or AppArmor policies.