CVE-2024-10026

5.3 MEDIUM

📋 TL;DR

This vulnerability in Google's gVisor container runtime allows remote attackers to calculate a local IP address and per-boot identifier using weak hashing algorithms and small seed sizes. This could enable device tracking in certain network configurations. Systems using vulnerable versions of gVisor for container isolation are affected.

💻 Affected Systems

Products:
  • Google gVisor
Versions: Versions prior to fixes in commits 83f75082e5b03fafca9201d9d9939028f712b0b2, e54bfde79278cafadedbf73c68ee10cb5982f2af, f956b5ac17ae1f60a4d21999b59ba18c55f86d56
Operating Systems: Linux (gVisor runtime)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using gVisor for container sandboxing. Standard Docker/containerd runtimes are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent device tracking across network sessions, potentially enabling correlation of user activities or aiding in targeted attacks.

🟠

Likely Case

Limited device fingerprinting capability that could contribute to tracking when combined with other identifiers.

🟢

If Mitigated

Minimal impact as the identifiers are local and per-boot, with limited practical tracking value in isolation.

🌐 Internet-Facing: LOW - The vulnerability requires specific network access and conditions to extract meaningful identifiers.
🏢 Internal Only: LOW - Even internally, this provides limited tracking capability without other vulnerabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to the gVisor instance and understanding of the weak hashing implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions containing commits 83f75082e5b03fafca9201d9d9939028f712b0b2, e54bfde79278cafadedbf73c68ee10cb5982f2af, f956b5ac17ae1f60a4d21999b59ba18c55f86d56

Vendor Advisory: https://github.com/google/gvisor/commits

Restart Required: Yes

Instructions:

1. Update gVisor to latest version. 2. Restart all containers using gVisor runtime. 3. Verify the fix by checking gVisor version.

🔧 Temporary Workarounds

Use alternative container runtime

linux

Switch from gVisor to standard runc or containerd runtime

docker run --runtime=runc ...
containerd config default > /etc/containerd/config.toml

🧯 If You Can't Patch

  • Restrict network access to gVisor instances
  • Monitor for unusual network patterns targeting gVisor services

🔍 How to Verify

Check if Vulnerable:

Check gVisor version and compare against fixed commits: git log --oneline | grep -E '83f7508|e54bfde|f956b5a'

Check Version:

runsc --version

Verify Fix Applied:

Verify the three fix commits are present in your gVisor installation

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to gVisor control ports
  • Multiple connection attempts to extract identifiers

Network Indicators:

  • Repeated probing of gVisor network services
  • Patterns suggesting identifier calculation attempts

SIEM Query:

source="gvisor" AND (dest_port=control_port OR protocol=unusual)

🔗 References

📤 Share & Export