Race Condition Enabling Link Following Affecting github.com/opencontainers/runc/libcontainer/utils package, versions <1.1.14 >=1.2.0-rc.1 <1.2.0-rc.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINERUTILS-7856945
  • published 3 Sep 2024
  • disclosed 3 Sep 2024
  • credit Rodrigo Campos Catelin, Alban Crequy

How to fix?

Upgrade github.com/opencontainers/runc/libcontainer/utils to version 1.1.14, 1.2.0-rc.3 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition Enabling Link Following via the os.MkdirAll function due to inadvertently following symlinks. An attacker could create empty files or directories on a host system when sharing a volume between containers.

Notes:

  1. An attacker must have the ability to start containers using some kind of custom volume configuration.

  2. This vulnerability can not cause data loss, file deletion or truncation of existing files.

Workaround

This can be mitigated by using user namespaces, SELinux, or AppArmor policies.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
4.6 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Active
  • Confidentiality (VC)
    None
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    Low
  • Availability (SA)
    None