Skip to content

Docker Container Runtime Component Vulnerabilities - 20240202002

Overview

An attacker could use the core container infrastructure components of docker containers to escape the container and gain unauthorized access to the underlying host operating system from within the container.

What is vulnerable?

Component(s) Affected CVE Severity CVSS Exploitation Dated
OCI runc CVE-2024-21626 High 8.6 Yes 18.02.2024
Buildkit Mount CVE-2024-23651 High 7.4 No 08.02.2024
Buildkit GRPC SecurityMode CVE-2024-23653 Critical 9.8 No 08.02.2024
BuildKit Buildtime CVE-2024-23652 Critical 9.1 No 08.02.2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 Hours (refer Patch Management):

You will likely need to update your Docker daemons and Kubernetes deployments, as well as any container build tools that you use in CI/CD pipelines, on build servers, and on your developers' workstations

Additional Resources