-
Notifications
You must be signed in to change notification settings - Fork 62
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2023-25173, GHSA-hmfx-3pcx-653p Fixes #1574 Change-Id: Ia0fe55d91d704974b9df0da6aaf5be72d9528b2a Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/469099 Run-TryBot: Tim King <taking@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
- Loading branch information
1 parent
ece9a05
commit 4aae72d
Showing
2 changed files
with
189 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,132 @@ | ||
{ | ||
"id": "GO-2023-1574", | ||
"published": "0001-01-01T00:00:00Z", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2023-25173", | ||
"GHSA-hmfx-3pcx-653p" | ||
], | ||
"details": "Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially excalate privledges in the container. Uses of the containerd client library may also have improperly setup supplementary groups.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/containerd/containerd", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "1.6.0" | ||
}, | ||
{ | ||
"fixed": "1.6.18" | ||
} | ||
] | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-1574" | ||
}, | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/containerd/containerd/oci", | ||
"symbols": [ | ||
"WithAdditionalGIDs", | ||
"WithUIDGID", | ||
"WithUser", | ||
"WithUserID", | ||
"WithUsername" | ||
] | ||
}, | ||
{ | ||
"path": "github.com/containerd/containerd/pkg/cri/server", | ||
"symbols": [ | ||
"criService.CreateContainer", | ||
"criService.containerSpecOpts", | ||
"instrumentedAlphaService.CreateContainer", | ||
"instrumentedService.CreateContainer" | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
{ | ||
"package": { | ||
"name": "github.com/containerd/containerd", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.5.18" | ||
} | ||
] | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-1574" | ||
}, | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/containerd/containerd/oci", | ||
"symbols": [ | ||
"WithAdditionalGIDs", | ||
"WithUIDGID", | ||
"WithUser", | ||
"WithUserID", | ||
"WithUsername" | ||
] | ||
}, | ||
{ | ||
"path": "github.com/containerd/containerd/pkg/cri/server", | ||
"symbols": [ | ||
"criService.CreateContainer", | ||
"criService.containerSpecOpts", | ||
"instrumentedService.CreateContainer" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/advisories/GHSA-4wjj-jwc9-2x96" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/advisories/GHSA-fjm8-m7m6-2fjp" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/advisories/GHSA-phjr-8j92-w5v7" | ||
}, | ||
{ | ||
"type": "ARTICLE", | ||
"url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/" | ||
} | ||
], | ||
"schema_version": "1.3.1" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
modules: | ||
- module: github.com/containerd/containerd | ||
versions: | ||
- introduced: 1.6.0 | ||
fixed: 1.6.18 | ||
vulnerable_at: 1.6.17 | ||
packages: | ||
- package: github.com/containerd/containerd/oci | ||
symbols: | ||
- WithUser | ||
- WithUIDGID | ||
- WithUserID | ||
- WithUsername | ||
- WithAdditionalGIDs | ||
- package: github.com/containerd/containerd/pkg/cri/server | ||
symbols: | ||
- criService.containerSpecOpts | ||
derived_symbols: | ||
- criService.CreateContainer | ||
- instrumentedAlphaService.CreateContainer | ||
- instrumentedService.CreateContainer | ||
- module: github.com/containerd/containerd | ||
versions: | ||
- fixed: 1.5.18 | ||
vulnerable_at: 1.5.17 | ||
packages: | ||
- package: github.com/containerd/containerd/oci | ||
symbols: | ||
- WithUser | ||
- WithUIDGID | ||
- WithUserID | ||
- WithUsername | ||
- WithAdditionalGIDs | ||
- package: github.com/containerd/containerd/pkg/cri/server | ||
symbols: | ||
- criService.containerSpecOpts | ||
derived_symbols: | ||
- criService.CreateContainer | ||
- instrumentedService.CreateContainer | ||
description: |- | ||
Supplementary groups are not set up properly inside a container. If an attacker has direct | ||
access to a container and manipulates their supplementary group access, they may be able to use | ||
supplementary group access to bypass primary group restrictions in some cases and potentially | ||
excalate privledges in the container. | ||
Uses of the containerd client library may also have improperly setup supplementary groups. | ||
cves: | ||
- CVE-2023-25173 | ||
ghsas: | ||
- GHSA-hmfx-3pcx-653p | ||
references: | ||
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p | ||
- web: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4 | ||
- fix: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a | ||
- web: https://github.com/advisories/GHSA-4wjj-jwc9-2x96 | ||
- web: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp | ||
- web: https://github.com/advisories/GHSA-phjr-8j92-w5v7 | ||
- article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ |