Container breakout using runc file descriptors

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect exploitation of CVE-2024-21626 which abuses leaky file descriptors in runc.

Strategy

This exploit is accomplished by building or running a container image where the working directory is set to /proc/self/fd/<int>. In Docker this is specified using the WORKDIR field. In Kubernetes the field is workingDir. Successful exploitation results in read and write access to the host filesystem and potentially a complete container escape.

Triage and response

  1. Isolate the host to prevent further compromise.
  2. Use tags to determine the affected container and image.
  3. Use Docker or Kubernetes audit logs to determine how the exploit occurred. An adversary could have built or run a malicious container image in several ways, such as abusing external access to the Docker API or manipulating a base image.
  4. Review related signals to determine the impact of the compromise and develop a timeline.
  5. Redeploy the host with a runc version of 1.1.12 or later.

Requires Agent version 7.55 or later.