CVE-2023-25809
ADVISORY - githubSummary
Impact
It was found that rootless runc makes /sys/fs/cgroup writable in following conditons:
- when runc is executed inside the user namespace, and the
config.jsondoes not specify the cgroup namespace to be unshared (e.g..,(docker|podman|nerdctl) run --cgroupns=host, with Rootless Docker/Podman/nerdctl) - or, when runc is executed outside the user namespace, and
/sysis mounted withrbind, ro(e.g.,runc spec --rootless; this condition is very rare)
A container may gain the write access to user-owned cgroup hierarchy /sys/fs/cgroup/user.slice/... on the host .
Other users's cgroup hierarchies are not affected.
Patches
v1.1.5 (planned)
Workarounds
- Condition 1: Unshare the cgroup namespace (
(docker|podman|nerdctl) run --cgroupns=private). This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. - Condition 2 (very rare): add
/sys/fs/cgrouptomaskedPaths
EPSS Score: 0.00033 (0.093)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Preservation of Permissions
ADVISORY - github
Improper Preservation of Permissions
ADVISORY - gitlab
ADVISORY - redhat
Incorrect Default Permissions
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in