Description: runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. Broken commit info: Bugfix commit info: https://github.com/opencontainers/runc/commit/f3429eda1a8d478d7dbcb9c07cef943d88e67671 https://github.com/opencontainers/runc/commit/2ed79a6c91e56dcd2d1da47f8ffd663066153746 https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf https://github.com/opencontainers/runc/commit/996a33c0e468435c70a34a25be1cb023d7554563 https://github.com/opencontainers/runc/commit/7362cd5afe9d40131fb62cb075092025c7c71064 https://github.com/opencontainers/runc/commit/b2b5754eb34174e032f1048beb1b27db83e77c5a https://github.com/opencontainers/runc/commit/4f263985016276c2faf709e9db98fcc8677a8a13 https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf' target='_blank' rel='noopener noreferrer