Miggo Logo

GHSA-c5pj-mqfh-rvc3: Withdrawn: Runc allows an arbitrary systemd property to be injected

7.2

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
4/26/2024
Updated
6/5/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/opencontainers/runcgo< 1.2.0-rc.11.2.0-rc.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability was initially attributed to runc's handling of config annotations but was later withdrawn as the root cause was identified in CRI-O's failure to filter dangerous annotations before passing them to runc. The runc commit 3db0871 adds a 'potentiallyUnsafeConfigAnnotations' list in features.go to help consumers identify unsafe annotations, which is a protective measure rather than a vulnerability. The actual command injection occurs at the CRI-O layer when processing pod annotations, not in runc's functions. No specific functions in runc's codebase were identified as directly vulnerable with high confidence, as the advisory withdrawal indicates the vulnerability was misattributed.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Wit**r*wn **visory T*is **visory **s ***n wit**r*wn ****us* it w*s in*orr**tly *ttri*ut** to run*. Pl**s* s** t** issu* [**r*](*ttps://*it*u*.*om/op*n*ont*in*rs/run*/issu*s/****) *or mor* in*orm*tion. ## Ori*in*l **s*ription * *l*w w*s *oun* in

Reasoning

T** vuln*r**ility w*s initi*lly *ttri*ut** to `run*`'s **n*lin* o* `*on*i*` *nnot*tions *ut w*s l*t*r wit**r*wn *s t** root **us* w*s i**nti*i** in `*RI-O`'s **ilur* to *ilt*r **n**rous *nnot*tions ***or* p*ssin* t**m to `run*`. T** `run*` *ommit `**