-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in github.com/opencontainers/runc: CVE-2023-25809 #1682
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Comments
maceonthompson
added
the
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
label
Mar 30, 2023
Change https://go.dev/cl/480716 mentions this issue: |
Change https://go.dev/cl/592760 mentions this issue: |
Change https://go.dev/cl/606784 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Aug 20, 2024
- data/reports/GO-2023-1643.yaml - data/reports/GO-2023-1644.yaml - data/reports/GO-2023-1651.yaml - data/reports/GO-2023-1652.yaml - data/reports/GO-2023-1653.yaml - data/reports/GO-2023-1654.yaml - data/reports/GO-2023-1655.yaml - data/reports/GO-2023-1656.yaml - data/reports/GO-2023-1657.yaml - data/reports/GO-2023-1658.yaml - data/reports/GO-2023-1659.yaml - data/reports/GO-2023-1660.yaml - data/reports/GO-2023-1661.yaml - data/reports/GO-2023-1662.yaml - data/reports/GO-2023-1670.yaml - data/reports/GO-2023-1671.yaml - data/reports/GO-2023-1682.yaml - data/reports/GO-2023-1683.yaml - data/reports/GO-2023-1685.yaml - data/reports/GO-2023-1699.yaml Updates #1643 Updates #1644 Updates #1651 Updates #1652 Updates #1653 Updates #1654 Updates #1655 Updates #1656 Updates #1657 Updates #1658 Updates #1659 Updates #1660 Updates #1661 Updates #1662 Updates #1670 Updates #1671 Updates #1682 Updates #1683 Updates #1685 Updates #1699 Change-Id: Iddcfb6c5438e03827049eecbf0a95fae6c078436 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/606784 Reviewed-by: Damien Neil <dneil@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
This was referenced Sep 3, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
CVE-2023-25809 references github.com/opencontainers/runc, which may be a Go module.
Description:
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes
/sys/fs/cgroup
writable in following conditons: 1. when runc is executed inside the user namespace, and theconfig.json
does not specify the cgroup namespace to be unshared (e.g..,(docker|podman|nerdctl) run --cgroupns=host
, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and/sys
is mounted withrbind, ro
(e.g.,runc spec --rootless
; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy/sys/fs/cgroup/user.slice/...
on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace ((docker|podman|nerdctl) run --cgroupns=private)
. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add/sys/fs/cgroup
tomaskedPaths
.References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: