Lucene search

K
nvd[email protected]NVD:CVE-2023-27561
HistoryMar 03, 2023 - 7:15 p.m.

CVE-2023-27561

2023-03-0319:15:11
CWE-706
web.nvd.nist.gov
11
cve-2023-27561
runc
access control
escalation of privileges
libcontainer
rootfs_linux.go
volume-mount configurations
custom images
cve-2019-19921 regression

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

19.0%

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

Affected configurations

Nvd
Node
linuxfoundationruncRange<1.1.5
Node
redhatopenshift_container_platformMatch4.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
debiandebian_linuxMatch10.0
VendorProductVersionCPE
linuxfoundationrunc*cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
redhatopenshift_container_platform4.0cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

References

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

19.0%