HomeCyber BalkansDocker and other container engines vulnerabilities allow access to host OS

Docker and other container engines vulnerabilities allow access to host OS

Published on

spot_img

A cloud security firm has discovered four vulnerabilities in Docker components that could allow attackers to gain access to the host operating system from within containers. The researcher who found these vulnerabilities, Rory McNamara, has named them “Leaky Vessels” because they compromise the critical isolation layer between containers and the host operating system.

The most concerning vulnerability is in runc, a command-line tool for spawning and running containers on Linux. Runc underpins multiple container engines, not just Docker. This means that the impact of these vulnerabilities extends beyond just the Docker platform.

According to the security firm Snyk, these container escapes could allow an attacker to gain unauthorized access to the underlying host operating system from within the container. This unauthorized access could potentially lead to the exposure of sensitive data such as credentials and customer information. It could also provide attackers with the ability to launch further attacks, especially if the access gained includes superuser privileges.

Runc can be viewed as the plumbing that ties most container management engines, such as Docker, containerd, Podman, and CRI-O, to the Linux kernel’s sandboxing features. It supports multiple commands for managing containers and executing processes inside containers.

The vulnerability in runc, known as CVE-2024-21626, originates from a file descriptor being inadvertently leaked internally within runc, including a handle to the host’s /sys/fs/cgroup. This flaw can be exploited in multiple ways, one of which was found by McNamara, and three others were identified by runc maintainers.

The runc maintainers issued an advisory warning that if a container is configured to have a specific setting, the resulting process in that container will have access to the entire host filesystem. This allows a malicious image to trick a user into starting a container whose binary has access to the host filesystem.

This particular exploit targets the runc run command, which is used to create and start a new container from an image. Given that many containers are started from images downloaded from public repositories such as Docker Hub, the potential for malicious images to be uploaded to these repositories is a serious concern.

The impact of these vulnerabilities in runc is not limited to Docker, as it affects multiple container management engines. As such, securing these vulnerabilities is crucial for the broader container ecosystem.

Overall, the “Leaky Vessels” vulnerabilities pose a significant threat to the security of containerized environments, and the discovery of these flaws underscores the ongoing need for robust security measures and constant vigilance in the containerization space. Organizations that rely on container technologies should be diligent in applying patches and updates to mitigate the risk of exploitation. Additionally, container image hygiene and validation practices are essential for preventing the deployment of malicious images that could exploit these vulnerabilities.

Source link

Latest articles

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...

Cyber Briefing – April 21, 2026 – CyberMaterial

Cybersecurity Briefing: Emerging Threats and Corporate Developments In the ever-evolving landscape of cybersecurity, recent reports...

AI-Powered NGate Malware Successfully Evades Detection in NFC Payment Applications

Rising Threat of NGate Malware via HandyPay: A Detailed Exploration A new variant of the...

More like this

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...

Cyber Briefing – April 21, 2026 – CyberMaterial

Cybersecurity Briefing: Emerging Threats and Corporate Developments In the ever-evolving landscape of cybersecurity, recent reports...