-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
x/vulndb: potential Go vuln in github.com/moby/moby: CVE-2022-36109 #985
Labels
excluded: NOT_IMPORTABLE
This vulnerability only exists in a binary and is not importable.
NeedsTriage
Comments
This vulnerability does not seem to affect any importable package. The suggested fix for the issue also implies that this is a binary. |
Change https://go.dev/cl/430975 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Sep 15, 2022
Fixes #985 Change-Id: I6ebfb9f34bde24fe9109f63536577a5dcfb33da5 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/430975 Reviewed-by: Damien Neil <dneil@google.com> Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
This was referenced Apr 4, 2023
This was referenced Nov 8, 2023
This was referenced Feb 1, 2024
Change https://go.dev/cl/592774 mentions this issue: |
Change https://go.dev/cl/607230 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Aug 21, 2024
- data/reports/GO-2022-0985.yaml - data/reports/GO-2022-0986.yaml - data/reports/GO-2022-0987.yaml - data/reports/GO-2022-0989.yaml - data/reports/GO-2022-0995.yaml - data/reports/GO-2022-1000.yaml - data/reports/GO-2022-1006.yaml - data/reports/GO-2022-1014.yaml - data/reports/GO-2022-1015.yaml - data/reports/GO-2022-1019.yaml - data/reports/GO-2022-1021.yaml - data/reports/GO-2022-1023.yaml - data/reports/GO-2022-1029.yaml - data/reports/GO-2022-1032.yaml - data/reports/GO-2022-1033.yaml - data/reports/GO-2022-1060.yaml - data/reports/GO-2022-1062.yaml - data/reports/GO-2022-1065.yaml - data/reports/GO-2022-1066.yaml - data/reports/GO-2022-1067.yaml Updates #985 Updates #986 Updates #987 Updates #989 Updates #995 Updates #1000 Updates #1006 Updates #1014 Updates #1015 Updates #1019 Updates #1021 Updates #1023 Updates #1029 Updates #1032 Updates #1033 Updates #1060 Updates #1062 Updates #1065 Updates #1066 Updates #1067 Change-Id: I27b6f79e1898a13040a758a71348464c5e7c72a9 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/607230 Auto-Submit: Tatiana Bradley <tatianabradley@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Damien Neil <dneil@google.com> Commit-Queue: Tatiana Bradley <tatianabradley@google.com>
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
Labels
excluded: NOT_IMPORTABLE
This vulnerability only exists in a binary and is not importable.
NeedsTriage
CVE-2022-36109 references github.com/moby/moby, which may be a Go module.
Description:
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the
"USER $USERNAME"
Dockerfile instruction. Instead by callingENTRYPOINT ["su", "-", "user"]
the supplementary groups will be set up properly.References:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: