How to fix CVE-2024-21626 – Step-by-Step Guide
CVE-2024-21626 (runc Container Escape – Leaky Vessels) is a <strong>HIGH severity</strong> vulnerability with a CVSS score of 8.6/10. A file descriptor leak in runc allows attackers to escape container isolation and gain root access to the host system. Affects Docker, Kubernetes, and other runc-based container runtimes. Follow the step-by-step guide below to remediate this vulnerability in your infrastructure.
What is runc Container Escape – Leaky Vessels?
runc Container Escape – Leaky Vessels (CVE-2024-21626) affects <strong>runc (Docker, Kubernetes, containerd)</strong>. A file descriptor leak in runc allows attackers to escape container isolation and gain root access to the host system. Affects Docker, Kubernetes, and other runc-based container runtimes. It was published on 2024-01-31 and affects <strong>runc < 1.1.12</strong>. The fixed version is <strong>runc 1.1.12+</strong>.
Impact and Risks for your Infrastructure
Container escape to host root. Any container with access to /proc/self/fd can exploit the file descriptor leak to escape isolation and compromise the host.
Step-by-Step Mitigation Guide
To remediate CVE-2024-21626, follow the prioritized mitigation steps: Update runc to 1.1.12 or later. → Update Docker to 25.0.2+ / 24.0.9+ and containerd to 1.7.13+ / 1.6.27+. → Run containers as non-root with --user and --cap-drop=ALL. → Enable Seccomp and AppArmor/SELinux profiles for containers. → Restrict /proc access with read-only mounts where possible. → Run containers in rootless mode (Podman, rootless Docker) for defense-in-depth.. Verify the fix using the verification commands below and confirm the patched version is deployed across all affected systems.
- 1Update runc to 1.1.12 or later.
- 2Update Docker to 25.0.2+ / 24.0.9+ and containerd to 1.7.13+ / 1.6.27+.
- 3Run containers as non-root with --user and --cap-drop=ALL.
- 4Enable Seccomp and AppArmor/SELinux profiles for containers.
- 5Restrict /proc access with read-only mounts where possible.
- 6Run containers in rootless mode (Podman, rootless Docker) for defense-in-depth.