Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1058 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`. |
Github GHSA |
GHSA-m8cg-xc2p-r3fc | rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc |
Ubuntu USN |
USN-6088-1 | runC vulnerabilities |
Ubuntu USN |
USN-6088-2 | runC vulnerabilities |
Wed, 12 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T16:02:24.090Z
Reserved: 2023-02-15T16:34:48.772Z
Link: CVE-2023-25809
Updated: 2024-08-02T11:32:12.344Z
Status : Modified
Published: 2023-03-29T19:15:22.170
Modified: 2024-11-21T07:50:14.570
Link: CVE-2023-25809
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN