Container breakout using runc file descriptors

Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

What happened

A container executed with a working directory set to /proc/self/fd/*, indicating exploitation of the container escape vulnerability CVE-2024-21626.

Goal

Detect exploitation of CVE-2024-21626 which abuses leaky file descriptors in runc.

Strategy

This exploit is accomplished by building or running a container image where the working directory is set to /proc/self/fd/<int>. In Docker this is specified using the WORKDIR field. In Kubernetes the field is workingDir. Successful exploitation results in read and write access to the host filesystem and potentially a complete container escape.

Triage and response

  1. Isolate the host to prevent further compromise.
  2. Use tags to determine the affected container and image.
  3. Use Docker or Kubernetes audit logs to determine how the exploit occurred. An adversary could have built or run a malicious container image in several ways, such as abusing external access to the Docker API or manipulating a base image.
  4. Review related signals to determine the impact of the compromise and develop a timeline.
  5. Redeploy the host with a runc version of 1.1.12 or later.

Requires Agent version 7.55 or later.