Bugzilla – Bug 1209884
VUL-0: CVE-2023-25809: docker-runc,runc: rootless `/sys/fs/cgroup` is writable when cgroupns isn't unshared
Last modified: 2024-07-22 13:51:34 UTC
CVE-2023-25809 Impact: It was found that rootless runc makes /sys/fs/cgroup writable in following conditons: when runc is executed inside the user namespace, and the config.json does not specify the cgroup namespace to be unshared (e.g.., (docker|podman|nerdctl) run --cgroupns=host, with Rootless Docker/Podman/nerdctl) or, when runc is executed outside the user namespace, and /sys is mounted with rbind, ro (e.g., runc spec --rootless; this condition is very rare) A container may gain the write access to user-owned cgroup hierarchy /sys/fs/cgroup/user.slice/... on the host . Other users's cgroup hierarchies are not affected. Patches: v1.1.5 (planned) Workarounds: Condition 1: Unshare the cgroup namespace ((docker|podman|nerdctl) run --cgroupns=private). This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. Condition 2 (very rare): add /sys/fs/cgroup to maskedPaths https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
MR for this issue has already been submitted and accepted: * https://build.suse.de/request/show/293315 * https://build.suse.de/request/show/293316
This is an autogenerated message for OBS integration: This bug (1209884) was mentioned in https://build.opensuse.org/request/show/1075228 Factory / runc
SUSE-SU-2023:1726-1: An update that solves three vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1168481, 1208962, 1209884, 1209888 CVE References: CVE-2023-25809, CVE-2023-27561, CVE-2023-28642 Sources used: Containers Module 12 (src): runc-1.1.5-16.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2003-1: An update that solves three vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1168481, 1208962, 1209884, 1209888 CVE References: CVE-2023-25809, CVE-2023-27561, CVE-2023-28642 Sources used: openSUSE Leap Micro 5.3 (src): runc-1.1.5-150000.41.1 openSUSE Leap 15.4 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro 5.3 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro 5.4 (src): runc-1.1.5-150000.41.1 Containers Module 15-SP4 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): runc-1.1.5-150000.41.1 SUSE Enterprise Storage 7.1 (src): runc-1.1.5-150000.41.1 SUSE Enterprise Storage 7 (src): runc-1.1.5-150000.41.1 SUSE CaaS Platform 4.0 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro 5.1 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro 5.2 (src): runc-1.1.5-150000.41.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): runc-1.1.5-150000.41.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.