Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-27561

Опубликовано: 20 фев. 2023
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization by adding a symlink to the rootfs that points to a directory on the volume.

Отчет

The vulnerability in runc, related to Incorrect Access Control in libcontainer/rootfs_linux.go, is classified as a moderate severity issue due to its prerequisites for exploitation and the level of access required by an attacker. To exploit this vulnerability, an attacker must have the capability to spawn two containers with custom volume-mount configurations and execute custom images within these containers. This restricts the attack vector to scenarios where an attacker already has a certain level of access to the container environment. Additionally, the vulnerability leads to an escalation of privileges, potentially allowing an attacker to gain elevated permissions on the host system. While the impact of privilege escalation is significant, the specific conditions required for successful exploitation mitigate the overall severity to moderate. This CVE exists because of a CVE-2019-19921 regression.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7runcOut of support scope
Red Hat Enterprise Linux 8container-tools:3.0/runcAffected
Red Hat OpenShift Container Platform 3.11atomic-openshiftOut of support scope
Red Hat OpenShift Container Platform 3.11runcOut of support scope
Red Hat OpenShift Container Platform 4microshiftWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-podNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-testsWill not fix
Red Hat OpenShift Container Platform Assisted Installer 1rhai-tech-preview/assisted-installer-agent-rhel8Not affected
Red Hat OpenShift Container Platform Assisted Installer 1rhai-tech-preview/assisted-installer-reporter-rhel8Not affected
Red Hat OpenShift Container Platform Assisted Installer 1rhai-tech-preview/assisted-installer-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-41
https://bugzilla.redhat.com/show_bug.cgi?id=2175721runc: volume mount race condition (regression of CVE-2019-19921)

EPSS

Процентиль: 30%
0.00107
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
nvd
больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVSS3: 7
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7
debian
больше 2 лет назад

runc through 1.1.4 has Incorrect Access Control leading to Escalation ...

CVSS3: 7
github
больше 2 лет назад

Opencontainers runc Incorrect Authorization vulnerability

EPSS

Процентиль: 30%
0.00107
Низкий

7 High

CVSS3