Bug 1208426 (CVE-2023-25173) - VUL-0: CVE-2023-25173: containerd: Supplementary groups are not set up properly
Summary: VUL-0: CVE-2023-25173: containerd: Supplementary groups are not set up properly
Status: RESOLVED FIXED
Alias: CVE-2023-25173
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Containers Team
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/357413/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-25173:5.3:(AV:...
Keywords:
Depends on:
Blocks: 1215711
  Show dependency treegraph
 
Reported: 2023-02-17 13:44 UTC by Thomas Leroy
Modified: 2023-11-01 09:12 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2023-02-17 13:44:41 UTC
CVE-2023-25173

containerd is an open source container runtime. A bug was found in containerd
prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up
properly inside a container. If an attacker has direct access to a container and
manipulates their supplementary group access, they may be able to use
supplementary group access to bypass primary group restrictions in some cases,
potentially gaining access to sensitive information or gaining the ability to
execute code in that container. Downstream applications that use the containerd
client library may be affected as well. This bug has been fixed in containerd
v1.6.18 and v.1.5.18. Users should update to these versions and recreate
containers to resolve this issue. Users who rely on a downstream application
that uses containerd's client library should check that application for a
separate advisory and instructions. As a workaround, ensure that the `"USER
$USERNAME"` Dockerfile instruction is not used. Instead, set the container
entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su`
to properly set up supplementary groups.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25173
https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
https://github.com/containerd/containerd/releases/tag/v1.5.18
https://github.com/containerd/containerd/releases/tag/v1.6.18
https://www.cve.org/CVERecord?id=CVE-2023-25173
https://github.com/advisories/GHSA-4wjj-jwc9-2x96
https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
https://github.com/advisories/GHSA-phjr-8j92-w5v7
https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Comment 1 Thomas Leroy 2023-02-17 13:44:54 UTC
Affected:
- SUSE:SLE-12:Update
- SUSE:SLE-15:Update
- openSUSE:Factory
Comment 3 OBSbugzilla Bot 2023-03-29 13:45:07 UTC
This is an autogenerated message for OBS integration:
This bug (1208426) was mentioned in
https://build.opensuse.org/request/show/1075229 Factory / containerd