Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-25173

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-16 Feb, 2023 | 14:09
Updated At-10 Mar, 2025 | 21:10
Rejected At-
Credits

containerd supplementary groups are not set up properly

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:16 Feb, 2023 | 14:09
Updated At:10 Mar, 2025 | 21:10
Rejected At:
▼CVE Numbering Authority (CNA)
containerd supplementary groups are not set up properly

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.

Affected Products
Vendor
containerd
Product
containerd
Versions
Affected
  • < 1.5.18
  • >= 1.6.0, < 1.6.18
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863: Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863: Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
x_refsource_CONFIRM
https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
x_refsource_MISC
https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
x_refsource_MISC
https://github.com/advisories/GHSA-4wjj-jwc9-2x96
x_refsource_MISC
https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
x_refsource_MISC
https://github.com/advisories/GHSA-phjr-8j92-w5v7
x_refsource_MISC
https://github.com/containerd/containerd/releases/tag/v1.5.18
x_refsource_MISC
https://github.com/containerd/containerd/releases/tag/v1.6.18
x_refsource_MISC
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
x_refsource_MISC
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
N/A
Hyperlink: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Resource:
x_refsource_MISC
Hyperlink: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Resource:
x_refsource_MISC
Hyperlink: https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Resource:
x_refsource_MISC
Hyperlink: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Resource:
x_refsource_MISC
Hyperlink: https://github.com/advisories/GHSA-phjr-8j92-w5v7
Resource:
x_refsource_MISC
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.5.18
Resource:
x_refsource_MISC
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.6.18
Resource:
x_refsource_MISC
Hyperlink: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Resource:
x_refsource_MISC
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
x_refsource_CONFIRM
x_transferred
https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
x_refsource_MISC
x_transferred
https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
x_refsource_MISC
x_transferred
https://github.com/advisories/GHSA-4wjj-jwc9-2x96
x_refsource_MISC
x_transferred
https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
x_refsource_MISC
x_transferred
https://github.com/advisories/GHSA-phjr-8j92-w5v7
x_refsource_MISC
x_transferred
https://github.com/containerd/containerd/releases/tag/v1.5.18
x_refsource_MISC
x_transferred
https://github.com/containerd/containerd/releases/tag/v1.6.18
x_refsource_MISC
x_transferred
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
x_refsource_MISC
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
x_transferred
Hyperlink: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/advisories/GHSA-phjr-8j92-w5v7
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.5.18
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.6.18
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:16 Feb, 2023 | 15:15
Updated At:15 Sep, 2023 | 21:15

containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.15.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CPE Matches

The Linux Foundation
linuxfoundation
>>containerd>>Versions before 1.5.18(exclusive)
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>containerd>>Versions from 1.6.0(inclusive) to 1.6.18(exclusive)
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarysecurity-advisories@github.com
CWE-863Secondarynvd@nist.gov
CWE ID: CWE-863
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-863
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/advisories/GHSA-4wjj-jwc9-2x96security-advisories@github.com
Not Applicable
https://github.com/advisories/GHSA-fjm8-m7m6-2fjpsecurity-advisories@github.com
Not Applicable
https://github.com/advisories/GHSA-phjr-8j92-w5v7security-advisories@github.com
Not Applicable
https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460asecurity-advisories@github.com
Patch
https://github.com/containerd/containerd/releases/tag/v1.5.18security-advisories@github.com
Release Notes
https://github.com/containerd/containerd/releases/tag/v1.6.18security-advisories@github.com
Release Notes
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653psecurity-advisories@github.com
Mitigation
Vendor Advisory
https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4security-advisories@github.com
Not Applicable
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/security-advisories@github.com
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/security-advisories@github.com
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/security-advisories@github.com
N/A
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/security-advisories@github.com
Exploit
Third Party Advisory
Hyperlink: https://github.com/advisories/GHSA-4wjj-jwc9-2x96
Source: security-advisories@github.com
Resource:
Not Applicable
Hyperlink: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
Source: security-advisories@github.com
Resource:
Not Applicable
Hyperlink: https://github.com/advisories/GHSA-phjr-8j92-w5v7
Source: security-advisories@github.com
Resource:
Not Applicable
Hyperlink: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.5.18
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/containerd/containerd/releases/tag/v1.6.18
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
Source: security-advisories@github.com
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
Source: security-advisories@github.com
Resource:
Not Applicable
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Source: security-advisories@github.com
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found