# How to Fix CVE-2024-21626 Vulnerability On February 1, 2024, the runc community publicly announced a [security advisory for runc container escape](https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv), identified as **CVE-2024-21626** . The root cause of this vulnerability is due to an internal file descriptor leak in runc, allowing attackers to exploit the vulnerability and gain unauthorized access to the entire file system of the host where the container is located. DCE 5.0 Installer has released version v0.15.2, which upgrades the **containerd** version to **1.7.13** and the runc version to **v1.1.12** . This means that clusters created in the DCE 5.0 environment based on version v0.15.2 are not affected by this vulnerability. !!! note After upgrading to version v0.15.2, the supported cluster versions have been updated from v1.26.0 ~ v1.29.0 to v1.27.0 ~ v0.29.1. ## Solution ### Prerequisites Confirm the scope of the cluster, which can be done in the following two ways: - If the cluster version is v1.27.0 ~ v0.29.1, follow the [Upgrade DCE 5.0 Components](../upgrade.md) guide for upgrading. After a successful upgrade, refer to the steps below for [Updating Component Versions Configuration](#updating-component-version-configuration) and [Issuing Component Upgrade Tasks](#issuing-component-upgrade-tasks). - Visit [kubean](https://github.com/kubean-io/kubean) to view the released [artifacts](https://kubean-io.github.io/kubean/zh/releases/artifacts/), and choose the specific artifact version based on the actual situation. The supported artifact versions and corresponding cluster version ranges are as follows: | Artifact Version | Supported Cluster Range | DCE 5.0 Support | Notes | | --- | --- | --- | --- | | release-2.21 | v1.23.0 ~ v1.25.6 | Installer v0.14.0+ | The community currently does not support the upgrade of the runc component in this artifact package. | | release-2.22 | v1.24.0 ~ v1.26.9 | Installer v0.15.0+ | Supports the latest runc, containerd | | release-2.23 | v1.25.0 ~ v1.27.7 | Expected Installer v0.16.0+ | Expected support in April | Therefore, only the release-2.22 artifact package currently supports **containerd, runc upgrades** . Hence, for cluster versions v1.24.0 ~ v1.26, follow all the steps below. This article demonstrates the offline deployment of a K8s cluster version `v1.24.14`, upgrading the **containerd** version from **1.7.1** to **1.7.13** , and the **runc** version from **v1.1.7** to **v1.1.12** . Therefore, choose the `release-2.22` artifact. ### Steps #### Creating and Importing runc/containerd Related Offline Packages 1. Define environment variables: minio address and username/password ```bash MINIO_USER="rootuser" MINIO_PASS="rootpass123" MINIO_ADDR="http://172.30.**.***:9000" ``` 2. Define environment variable: airgap-patch image address ```bash AIRGAP_PATCH_IMG="ghcr.m.daocloud.io/kubean-io/airgap-patch:2.22-71b6fa1" ``` 3. Only create component packages for x86 architecture ```bash cat > "manifest.yml" <