Skip to content

Commit

Permalink
data/reports: add GO-2023-1574.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-25173, GHSA-hmfx-3pcx-653p

Fixes #1574

Change-Id: Ia0fe55d91d704974b9df0da6aaf5be72d9528b2a
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/469099
Run-TryBot: Tim King <taking@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
  • Loading branch information
timothy-king committed Feb 17, 2023
1 parent ece9a05 commit 4aae72d
Show file tree
Hide file tree
Showing 2 changed files with 189 additions and 0 deletions.
132 changes: 132 additions & 0 deletions data/osv/GO-2023-1574.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,132 @@
{
"id": "GO-2023-1574",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25173",
"GHSA-hmfx-3pcx-653p"
],
"details": "Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially excalate privledges in the container. Uses of the containerd client library may also have improperly setup supplementary groups.",
"affected": [
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.18"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1574"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/oci",
"symbols": [
"WithAdditionalGIDs",
"WithUIDGID",
"WithUser",
"WithUserID",
"WithUsername"
]
},
{
"path": "github.com/containerd/containerd/pkg/cri/server",
"symbols": [
"criService.CreateContainer",
"criService.containerSpecOpts",
"instrumentedAlphaService.CreateContainer",
"instrumentedService.CreateContainer"
]
}
]
}
},
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.18"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1574"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/oci",
"symbols": [
"WithAdditionalGIDs",
"WithUIDGID",
"WithUser",
"WithUserID",
"WithUsername"
]
},
{
"path": "github.com/containerd/containerd/pkg/cri/server",
"symbols": [
"criService.CreateContainer",
"criService.containerSpecOpts",
"instrumentedService.CreateContainer"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p"
},
{
"type": "WEB",
"url": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4"
},
{
"type": "FIX",
"url": "https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-4wjj-jwc9-2x96"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-fjm8-m7m6-2fjp"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-phjr-8j92-w5v7"
},
{
"type": "ARTICLE",
"url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"
}
],
"schema_version": "1.3.1"
}
57 changes: 57 additions & 0 deletions data/reports/GO-2023-1574.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
modules:
- module: github.com/containerd/containerd
versions:
- introduced: 1.6.0
fixed: 1.6.18
vulnerable_at: 1.6.17
packages:
- package: github.com/containerd/containerd/oci
symbols:
- WithUser
- WithUIDGID
- WithUserID
- WithUsername
- WithAdditionalGIDs
- package: github.com/containerd/containerd/pkg/cri/server
symbols:
- criService.containerSpecOpts
derived_symbols:
- criService.CreateContainer
- instrumentedAlphaService.CreateContainer
- instrumentedService.CreateContainer
- module: github.com/containerd/containerd
versions:
- fixed: 1.5.18
vulnerable_at: 1.5.17
packages:
- package: github.com/containerd/containerd/oci
symbols:
- WithUser
- WithUIDGID
- WithUserID
- WithUsername
- WithAdditionalGIDs
- package: github.com/containerd/containerd/pkg/cri/server
symbols:
- criService.containerSpecOpts
derived_symbols:
- criService.CreateContainer
- instrumentedService.CreateContainer
description: |-
Supplementary groups are not set up properly inside a container. If an attacker has direct
access to a container and manipulates their supplementary group access, they may be able to use
supplementary group access to bypass primary group restrictions in some cases and potentially
excalate privledges in the container.
Uses of the containerd client library may also have improperly setup supplementary groups.
cves:
- CVE-2023-25173
ghsas:
- GHSA-hmfx-3pcx-653p
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
- web: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
- fix: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
- web: https://github.com/advisories/GHSA-4wjj-jwc9-2x96
- web: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
- web: https://github.com/advisories/GHSA-phjr-8j92-w5v7
- article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/

0 comments on commit 4aae72d

Please sign in to comment.