Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-25809
HistoryMar 29, 2023 - 12:00 a.m.

CVE-2023-25809

2023-03-2900:00:00
ubuntu.com
ubuntu.com
51

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

8.3%

runc is a CLI tool for spawning and running containers according to the OCI
specification. In affected versions it was found that rootless runc makes
/sys/fs/cgroup writable in following conditons: 1. when runc is executed
inside the user namespace, and the config.json does not specify the
cgroup namespace to be unshared (e.gโ€ฆ, (docker|podman|nerdctl) run --cgroupns=host, with Rootless Docker/Podman/nerdctl) or 2. when runc is
executed outside the user namespace, and /sys is mounted with rbind, ro
(e.g., runc spec --rootless; this condition is very rare). A container
may gain the write access to user-owned cgroup hierarchy
/sys/fs/cgroup/user.slice/... on the host . Other usersโ€™s cgroup
hierarchies are not affected. Users are advised to upgrade to version
1.1.5. Users unable to upgrade may unshare the cgroup namespace
((docker|podman|nerdctl) run --cgroupns=private). This is the default
behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add
/sys/fs/cgroup to maskedPaths.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchrunc<ย 1.1.4-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchrunc<ย 1.1.4-0ubuntu1~20.04.3UNKNOWN
ubuntu22.04noarchrunc<ย 1.1.4-0ubuntu1~22.04.3UNKNOWN
ubuntu22.10noarchrunc<ย 1.1.4-0ubuntu1~22.10.3UNKNOWN
ubuntu23.04noarchrunc<ย 1.1.4-0ubuntu3.1UNKNOWN
ubuntu16.04noarchrunc<ย 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm4UNKNOWN

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

8.3%