CVE-2023-25809
ADVISORY - githubSummary
Impact
It was found that rootless runc makes /sys/fs/cgroup
writable in following conditons:
- when runc is executed inside the user namespace, and the
config.json
does not specify the cgroup namespace to be unshared (e.g..,(docker|podman|nerdctl) run --cgroupns=host
, with Rootless Docker/Podman/nerdctl) - or, when runc is executed outside the user namespace, and
/sys
is mounted withrbind, ro
(e.g.,runc spec --rootless
; this condition is very rare)
A container may gain the write access to user-owned cgroup hierarchy /sys/fs/cgroup/user.slice/...
on the host .
Other users's cgroup hierarchies are not affected.
Patches
v1.1.5 (planned)
Workarounds
- Condition 1: Unshare the cgroup namespace (
(docker|podman|nerdctl) run --cgroupns=private)
. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. - Condition 2 (very rare): add
/sys/fs/cgroup
tomaskedPaths
EPSS Score: 0.00044 (0.155)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Preservation of Permissions
ADVISORY - github
Improper Preservation of Permissions
ADVISORY - gitlab
ADVISORY - redhat
Incorrect Default Permissions
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in