Package: crun
Version: 1.21-1
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Dear Maintainer,

Versions of crun before 1.24 unconditionally `chown()` the stdio files of the
container to the UID inside the container. If the container's stdin is set
to `/dev/null` (which is the default for `podman`), and the container is
started by root but runs as a non-root user, this results in the owner of the
host's `/dev/null` being changed.

The impact of changing the owner of `/dev/null` is that the container
user can then `chmod()` the file, denying other users access. This may
cause denial of service.

The issue was fixed in https://github.com/containers/crun/pull/1847,
which is part of release 1.24.

-- System Information:
Debian Release: 13.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.12.39-1-insait (SMP w/56 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages crun depends on:
ii  libc6        2.41-12
ii  libcap2      1:2.75-10+b1
ii  libseccomp2  2.6.0-2
ii  libsystemd0  257.8-1~deb13u2
ii  libyajl2     2.1.0-5+b2

Versions of packages crun recommends:
pn  libcriu2  <none>

Versions of packages crun suggests:
pn  libwasmedge0  <none>

-- no debconf information

Reply via email to