Incorrect Default Permissions Affecting skopeo-tests package, versions <2:1.6.2-8.module+el8.9.0+19104+fcef53a3


Severity

Recommended
medium

Based on CentOS security rating

    Threat Intelligence

    EPSS
    0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS8-SKOPEOTESTS-6058801
  • published 15 Nov 2023
  • disclosed 29 Mar 2023

How to fix?

Upgrade Centos:8 skopeo-tests to version 2:1.6.2-8.module+el8.9.0+19104+fcef53a3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream skopeo-tests package and not the skopeo-tests package as distributed by Centos. See How to fix? for Centos:8 relevant fixed versions and status.

runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes /sys/fs/cgroup writable in following conditons: 1. when runc is executed inside the user namespace, and the config.json does not specify the cgroup namespace to be unshared (e.g.., (docker|podman|nerdctl) run --cgroupns=host, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and /sys is mounted with rbind, ro (e.g., runc spec --rootless; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy /sys/fs/cgroup/user.slice/... on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace ((docker|podman|nerdctl) run --cgroupns=private). This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add /sys/fs/cgroup to maskedPaths.

CVSS Scores

version 3.1
Expand this section

NVD

6.3 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    Low
Expand this section

Red Hat

2.5 low
Expand this section

SUSE

2.5 low