Init commit.
This commit is contained in:
503
general_result/25.log
Normal file
503
general_result/25.log
Normal file
@@ -0,0 +1,503 @@
|
||||
cve: ./data/2025/0xxx/CVE-2025-0113.json
|
||||
A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server.
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关**:
|
||||
是的,该CVE与网络隔离机制相关,并明确提到了Docker容器和Broker VM的主机网络。这涉及到容器与宿主机之间的网络隔离问题。
|
||||
|
||||
2. **是否会导致容器(例如Docker等)在运行时影响其他容器或宿主机**:
|
||||
是的,由于网络隔离机制的问题,攻击者可以从宿主机网络访问Docker容器,这可能会导致敏感数据泄露(如分析文件和日志)。这种漏洞可能允许攻击者绕过隔离,从而影响其他容器或宿主机的安全性。
|
||||
|
||||
因此,该CVE满足条件1和条件2。
|
||||
|
||||
cve: ./data/2025/0xxx/CVE-2025-0937.json
|
||||
Nomad Community and Nomad Enterprise ("Nomad") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或者容器、隔离相关:**
|
||||
是的,该 CVE 信息与 namespace 相关。描述中提到 Nomad 的事件流配置为 wildcard namespace 时,可能会绕过 ACL 策略,从而允许对其他 namespaces 进行读取操作。
|
||||
|
||||
2. **是否会导致容器(如 Docker 等)在运行时影响其他容器或宿主机:**
|
||||
不会直接影响其他容器或宿主机。此漏洞主要涉及权限控制问题,即通过 wildcard namespace 绕过 ACL 策略后,可以访问其他 namespaces 的数据。这可能间接影响依赖于正确权限隔离的容器化环境,但并未直接描述对容器运行时或宿主机的破坏性影响。
|
||||
|
||||
**结论:** 满足条件 1,不满足条件 2,因此返回分析内容。
|
||||
|
||||
cve: ./data/2025/21xxx/CVE-2025-21634.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
cgroup/cpuset: remove kernfs active break
|
||||
|
||||
A warning was found:
|
||||
|
||||
WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828
|
||||
CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G
|
||||
RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0
|
||||
RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202
|
||||
RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000
|
||||
RDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04
|
||||
RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180
|
||||
R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08
|
||||
R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0
|
||||
FS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:0000000000000000
|
||||
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
||||
CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0
|
||||
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
||||
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
||||
Call Trace:
|
||||
kernfs_drain+0x15e/0x2f0
|
||||
__kernfs_remove+0x165/0x300
|
||||
kernfs_remove_by_name_ns+0x7b/0xc0
|
||||
cgroup_rm_file+0x154/0x1c0
|
||||
cgroup_addrm_files+0x1c2/0x1f0
|
||||
css_clear_dir+0x77/0x110
|
||||
kill_css+0x4c/0x1b0
|
||||
cgroup_destroy_locked+0x194/0x380
|
||||
cgroup_rmdir+0x2a/0x140
|
||||
|
||||
It can be explained by:
|
||||
rmdir echo 1 > cpuset.cpus
|
||||
kernfs_fop_write_iter // active=0
|
||||
cgroup_rm_file
|
||||
kernfs_remove_by_name_ns kernfs_get_active // active=1
|
||||
__kernfs_remove // active=0x80000002
|
||||
kernfs_drain cpuset_write_resmask
|
||||
wait_event
|
||||
//waiting (active == 0x80000001)
|
||||
kernfs_break_active_protection
|
||||
// active = 0x80000001
|
||||
// continue
|
||||
kernfs_unbreak_active_protection
|
||||
// active = 0x80000002
|
||||
...
|
||||
kernfs_should_drain_open_files
|
||||
// warning occurs
|
||||
kernfs_put_active
|
||||
|
||||
This warning is caused by 'kernfs_break_active_protection' when it is
|
||||
writing to cpuset.cpus, and the cgroup is removed concurrently.
|
||||
|
||||
The commit 3a5a6d0c2b03 ("cpuset: don't nest cgroup_mutex inside
|
||||
get_online_cpus()") made cpuset_hotplug_workfn asynchronous, This change
|
||||
involves calling flush_work(), which can create a multiple processes
|
||||
circular locking dependency that involve cgroup_mutex, potentially leading
|
||||
to a deadlock. To avoid deadlock. the commit 76bb5ab8f6e3 ("cpuset: break
|
||||
kernfs active protection in cpuset_write_resmask()") added
|
||||
'kernfs_break_active_protection' in the cpuset_write_resmask. This could
|
||||
lead to this warning.
|
||||
|
||||
After the commit 2125c0034c5d ("cgroup/cpuset: Make cpuset hotplug
|
||||
processing synchronous"), the cpuset_write_resmask no longer needs to
|
||||
wait the hotplug to finish, which means that concurrent hotplug and cpuset
|
||||
operations are no longer possible. Therefore, the deadlock doesn't exist
|
||||
anymore and it does not have to 'break active protection' now. To fix this
|
||||
warning, just remove kernfs_break_active_protection operation in the
|
||||
'cpuset_write_resmask'.
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关**
|
||||
是的,该CVE信息与`cgroup`和`cpuset`子系统直接相关。`cgroup`(控制组)是Linux内核中用于限制、控制和隔离进程组资源(如CPU、内存、磁盘I/O等)的重要机制,广泛应用于容器技术(如Docker、Kubernetes等)以实现资源隔离。
|
||||
|
||||
2. **是否会导致容器(例如Docker等)在运行时影响其他容器或宿主机**
|
||||
从描述来看,该漏洞涉及`kernfs_break_active_protection`操作导致的警告问题。虽然这是一个潜在的内核问题,但它主要影响`cgroup`子系统的稳定性和一致性,而不是直接破坏容器之间的隔离性或对宿主机的安全造成威胁。具体来说:
|
||||
- 该问题可能导致内核在处理`cpuset.cpus`文件时出现竞争条件(concurrency issue),从而触发警告。
|
||||
- 不过,这种警告并不会直接导致容器逃逸(container escape)或其他安全风险,而是可能引发内核的不稳定行为(如死锁或崩溃),间接影响整个系统的可靠性。
|
||||
|
||||
3. **结论**
|
||||
由于该CVE与`cgroup`相关,并可能间接影响容器运行时的稳定性,因此满足条件1和条件2的部分要求。然而,它并不直接导致容器逃逸或直接影响其他容器或宿主机的安全性。
|
||||
|
||||
cve: ./data/2025/21xxx/CVE-2025-21659.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
netdev: prevent accessing NAPI instances from another namespace
|
||||
|
||||
The NAPI IDs were not fully exposed to user space prior to the netlink
|
||||
API, so they were never namespaced. The netlink API must ensure that
|
||||
at the very least NAPI instance belongs to the same netns as the owner
|
||||
of the genl sock.
|
||||
|
||||
napi_by_id() can become static now, but it needs to move because of
|
||||
dev_get_by_napi_id().
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关:**
|
||||
是的,这个 CVE 信息与 namespace 相关。具体来说,它涉及网络命名空间(netns)的隔离问题。NAPI(New API)实例在修复前可以被跨命名空间访问,这可能会破坏网络命名空间之间的隔离性。
|
||||
|
||||
2. **是否会导致容器(例如 Docker 等)在运行时影响其他容器或宿主机:**
|
||||
是的,这种漏洞可能会导致容器内的进程通过 netlink API 访问其他命名空间中的 NAPI 实例,从而可能影响其他容器或宿主机的网络功能。这种跨命名空间的访问会破坏容器之间的隔离性,可能导致敏感信息泄露或非授权的资源访问。
|
||||
|
||||
**结论:** 满足条件 1 和 2,因此需要进行上述分析。
|
||||
|
||||
cve: ./data/2025/21xxx/CVE-2025-21678.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
gtp: Destroy device along with udp socket's netns dismantle.
|
||||
|
||||
gtp_newlink() links the device to a list in dev_net(dev) instead of
|
||||
src_net, where a udp tunnel socket is created.
|
||||
|
||||
Even when src_net is removed, the device stays alive on dev_net(dev).
|
||||
Then, removing src_net triggers the splat below. [0]
|
||||
|
||||
In this example, gtp0 is created in ns2, and the udp socket is created
|
||||
in ns1.
|
||||
|
||||
ip netns add ns1
|
||||
ip netns add ns2
|
||||
ip -n ns1 link add netns ns2 name gtp0 type gtp role sgsn
|
||||
ip netns del ns1
|
||||
|
||||
Let's link the device to the socket's netns instead.
|
||||
|
||||
Now, gtp_net_exit_batch_rtnl() needs another netdev iteration to remove
|
||||
all gtp devices in the netns.
|
||||
|
||||
[0]:
|
||||
ref_tracker: net notrefcnt@000000003d6e7d05 has 1/2 users at
|
||||
sk_alloc (./include/net/net_namespace.h:345 net/core/sock.c:2236)
|
||||
inet_create (net/ipv4/af_inet.c:326 net/ipv4/af_inet.c:252)
|
||||
__sock_create (net/socket.c:1558)
|
||||
udp_sock_create4 (net/ipv4/udp_tunnel_core.c:18)
|
||||
gtp_create_sock (./include/net/udp_tunnel.h:59 drivers/net/gtp.c:1423)
|
||||
gtp_create_sockets (drivers/net/gtp.c:1447)
|
||||
gtp_newlink (drivers/net/gtp.c:1507)
|
||||
rtnl_newlink (net/core/rtnetlink.c:3786 net/core/rtnetlink.c:3897 net/core/rtnetlink.c:4012)
|
||||
rtnetlink_rcv_msg (net/core/rtnetlink.c:6922)
|
||||
netlink_rcv_skb (net/netlink/af_netlink.c:2542)
|
||||
netlink_unicast (net/netlink/af_netlink.c:1321 net/netlink/af_netlink.c:1347)
|
||||
netlink_sendmsg (net/netlink/af_netlink.c:1891)
|
||||
____sys_sendmsg (net/socket.c:711 net/socket.c:726 net/socket.c:2583)
|
||||
___sys_sendmsg (net/socket.c:2639)
|
||||
__sys_sendmsg (net/socket.c:2669)
|
||||
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
|
||||
|
||||
WARNING: CPU: 1 PID: 60 at lib/ref_tracker.c:179 ref_tracker_dir_exit (lib/ref_tracker.c:179)
|
||||
Modules linked in:
|
||||
CPU: 1 UID: 0 PID: 60 Comm: kworker/u16:2 Not tainted 6.13.0-rc5-00147-g4c1224501e9d #5
|
||||
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
|
||||
Workqueue: netns cleanup_net
|
||||
RIP: 0010:ref_tracker_dir_exit (lib/ref_tracker.c:179)
|
||||
Code: 00 00 00 fc ff df 4d 8b 26 49 bd 00 01 00 00 00 00 ad de 4c 39 f5 0f 85 df 00 00 00 48 8b 74 24 08 48 89 df e8 a5 cc 12 02 90 <0f> 0b 90 48 8d 6b 44 be 04 00 00 00 48 89 ef e8 80 de 67 ff 48 89
|
||||
RSP: 0018:ff11000009a07b60 EFLAGS: 00010286
|
||||
RAX: 0000000000002bd3 RBX: ff1100000f4e1aa0 RCX: 1ffffffff0e40ac6
|
||||
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8423ee3c
|
||||
RBP: ff1100000f4e1af0 R08: 0000000000000001 R09: fffffbfff0e395ae
|
||||
R10: 0000000000000001 R11: 0000000000036001 R12: ff1100000f4e1af0
|
||||
R13: dead000000000100 R14: ff1100000f4e1af0 R15: dffffc0000000000
|
||||
FS: 0000000000000000(0000) GS:ff1100006ce80000(0000) knlGS:0000000000000000
|
||||
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
||||
CR2: 00007f9b2464bd98 CR3: 0000000005286005 CR4: 0000000000771ef0
|
||||
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
||||
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
|
||||
PKRU: 55555554
|
||||
Call Trace:
|
||||
<TASK>
|
||||
? __warn (kernel/panic.c:748)
|
||||
? ref_tracker_dir_exit (lib/ref_tracker.c:179)
|
||||
? report_bug (lib/bug.c:201 lib/bug.c:219)
|
||||
? handle_bug (arch/x86/kernel/traps.c:285)
|
||||
? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
|
||||
? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)
|
||||
? _raw_spin_unlock_irqrestore (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:97 ./arch/x86/include/asm/irqflags.h:155 ./include/linux/spinlock_api_smp.h:151 kernel/locking/spinlock.c:194)
|
||||
? ref_tracker_dir_exit (lib/ref_tracker.c:179)
|
||||
? __pfx_ref_tracker_dir_exit (lib/ref_tracker.c:158)
|
||||
? kfree (mm/slub.c:4613 mm/slub.c:4761)
|
||||
net_free (net/core/net_namespace.c:476 net/core/net_namespace.c:467)
|
||||
cleanup_net (net/core/net_namespace.c:664 (discriminator 3))
|
||||
process_one_work (kernel/workqueue.c:3229)
|
||||
worker_thread (kernel/workqueue.c:3304 kernel/workqueue.c:3391
|
||||
---truncated---
|
||||
analysis: ### Analysis:
|
||||
|
||||
1. **Relevance to namespace, cgroup, container, or isolation:**
|
||||
- The CVE description mentions `netns` (network namespaces), which is a key component of Linux namespaces used in containerization technologies like Docker. Specifically, it discusses the improper handling of network devices and UDP sockets across different network namespaces (`src_net` and `dev_net(dev)`).
|
||||
- The issue arises when a network namespace (`src_net`) is removed, but the associated device (`gtp0`) remains alive in another namespace (`dev_net(dev)`), leading to a reference count mismatch and a kernel warning.
|
||||
- This indicates that the vulnerability is directly related to namespaces, which are fundamental to container isolation.
|
||||
|
||||
2. **Impact on containers or host:**
|
||||
- The described vulnerability does not appear to allow privilege escalation, arbitrary code execution, or direct interaction between containers or with the host system. Instead, it is a bug in resource management within network namespaces.
|
||||
- However, if improperly handled, such issues could theoretically lead to instability in containers or the host if the network namespace teardown process is disrupted. In this specific case, the impact seems limited to a kernel warning due to a reference count mismatch.
|
||||
- While the vulnerability does not directly compromise container isolation, it could indirectly affect the stability of containers using network namespaces.
|
||||
|
||||
3. **Conclusion:**
|
||||
- Based on the analysis, the CVE is related to namespaces and could have an indirect impact on container stability.
|
||||
- It does not explicitly allow breaking out of containers or affecting other containers or the host in a security-critical manner.
|
||||
|
||||
**Final Answer:**
|
||||
The CVE is related to namespaces and could indirectly impact container stability, but it does not directly compromise container isolation or allow affecting other containers or the host.
|
||||
|
||||
cve: ./data/2025/21xxx/CVE-2025-21771.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
sched_ext: Fix incorrect autogroup migration detection
|
||||
|
||||
scx_move_task() is called from sched_move_task() and tells the BPF scheduler
|
||||
that cgroup migration is being committed. sched_move_task() is used by both
|
||||
cgroup and autogroup migrations and scx_move_task() tried to filter out
|
||||
autogroup migrations by testing the destination cgroup and PF_EXITING but
|
||||
this is not enough. In fact, without explicitly tagging the thread which is
|
||||
doing the cgroup migration, there is no good way to tell apart
|
||||
scx_move_task() invocations for racing migration to the root cgroup and an
|
||||
autogroup migration.
|
||||
|
||||
This led to scx_move_task() incorrectly ignoring a migration from non-root
|
||||
cgroup to an autogroup of the root cgroup triggering the following warning:
|
||||
|
||||
WARNING: CPU: 7 PID: 1 at kernel/sched/ext.c:3725 scx_cgroup_can_attach+0x196/0x340
|
||||
...
|
||||
Call Trace:
|
||||
<TASK>
|
||||
cgroup_migrate_execute+0x5b1/0x700
|
||||
cgroup_attach_task+0x296/0x400
|
||||
__cgroup_procs_write+0x128/0x140
|
||||
cgroup_procs_write+0x17/0x30
|
||||
kernfs_fop_write_iter+0x141/0x1f0
|
||||
vfs_write+0x31d/0x4a0
|
||||
__x64_sys_write+0x72/0xf0
|
||||
do_syscall_64+0x82/0x160
|
||||
entry_SYSCALL_64_after_hwframe+0x76/0x7e
|
||||
|
||||
Fix it by adding an argument to sched_move_task() that indicates whether the
|
||||
moving is for a cgroup or autogroup migration. After the change,
|
||||
scx_move_task() is called only for cgroup migrations and renamed to
|
||||
scx_cgroup_move_task().
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关**
|
||||
是的,该CVE信息与cgroup相关。描述中提到`scx_move_task()`函数用于处理cgroup和autogroup迁移,并且涉及cgroup迁移时的检测问题。cgroup是Linux内核中用于限制、控制和隔离进程组资源使用的重要机制,广泛应用于容器技术(如Docker)中以实现资源隔离。
|
||||
|
||||
2. **是否会导致容器在运行时影响其他容器或宿主机**
|
||||
从描述来看,该漏洞主要导致一个警告(WARNING)被触发,而不是直接的安全漏洞或资源泄露问题。虽然它涉及cgroup迁移的检测逻辑,但并未提到可能导致容器逃逸、资源滥用或其他容器的影响。因此,该问题更倾向于是一个功能性缺陷,而非安全漏洞,不会直接影响其他容器或宿主机的安全性。
|
||||
|
||||
3. **结论**
|
||||
条件1满足,条件2不满足,因此返回分析结果而非"N/A"。
|
||||
|
||||
cve: ./data/2025/21xxx/CVE-2025-21834.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
seccomp: passthrough uretprobe systemcall without filtering
|
||||
|
||||
When attaching uretprobes to processes running inside docker, the attached
|
||||
process is segfaulted when encountering the retprobe.
|
||||
|
||||
The reason is that now that uretprobe is a system call the default seccomp
|
||||
filters in docker block it as they only allow a specific set of known
|
||||
syscalls. This is true for other userspace applications which use seccomp
|
||||
to control their syscall surface.
|
||||
|
||||
Since uretprobe is a "kernel implementation detail" system call which is
|
||||
not used by userspace application code directly, it is impractical and
|
||||
there's very little point in forcing all userspace applications to
|
||||
explicitly allow it in order to avoid crashing tracked processes.
|
||||
|
||||
Pass this systemcall through seccomp without depending on configuration.
|
||||
|
||||
Note: uretprobe is currently only x86_64 and isn't expected to ever be
|
||||
supported in i386.
|
||||
|
||||
[kees: minimized changes for easier backporting, tweaked commit log]
|
||||
analysis: 1. **分析是否与namespace、cgroup、container或者容器、隔离相关**
|
||||
是的,该CVE信息与容器和隔离相关。具体来说,问题出现在使用 `uretprobe` 调试工具时,当将其附加到运行在 Docker 容器中的进程时,由于默认的 seccomp 过滤器阻止了 `uretprobe` 系统调用,导致目标进程崩溃(段错误)。这表明问题涉及容器的默认安全机制(seccomp)以及其对系统调用的限制。
|
||||
|
||||
2. **分析是否会导致容器(例如Docker等)在运行时影响其他容器或宿主机**
|
||||
该漏洞本身并不会直接导致一个容器影响其他容器或宿主机。问题的核心在于调试工具 `uretprobe` 的系统调用被默认的 seccomp 配置所阻止,从而导致调试的目标进程崩溃。这种崩溃仅限于被调试的进程本身,并不会扩散到其他容器或宿主机。然而,如果用户明确配置 seccomp 规则以允许 `uretprobe`,可能会间接降低容器的安全性,但这并非此 CVE 的直接后果。
|
||||
|
||||
3. **结论**
|
||||
条件1满足,条件2不满足,因此返回以下分析结果:
|
||||
- 与 namespace、cgroup、container 或者容器、隔离相关:是。
|
||||
- 是否会导致容器影响其他容器或宿主机:否。
|
||||
|
||||
cve: ./data/2025/22xxx/CVE-2025-22089.json
|
||||
In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
RDMA/core: Don't expose hw_counters outside of init net namespace
|
||||
|
||||
Commit 467f432a521a ("RDMA/core: Split port and device counter sysfs
|
||||
attributes") accidentally almost exposed hw counters to non-init net
|
||||
namespaces. It didn't expose them fully, as an attempt to read any of
|
||||
those counters leads to a crash like this one:
|
||||
|
||||
[42021.807566] BUG: kernel NULL pointer dereference, address: 0000000000000028
|
||||
[42021.814463] #PF: supervisor read access in kernel mode
|
||||
[42021.819549] #PF: error_code(0x0000) - not-present page
|
||||
[42021.824636] PGD 0 P4D 0
|
||||
[42021.827145] Oops: 0000 [#1] SMP PTI
|
||||
[42021.830598] CPU: 82 PID: 2843922 Comm: switchto-defaul Kdump: loaded Tainted: G S W I XXX
|
||||
[42021.841697] Hardware name: XXX
|
||||
[42021.849619] RIP: 0010:hw_stat_device_show+0x1e/0x40 [ib_core]
|
||||
[42021.855362] Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 49 89 d0 4c 8b 5e 20 48 8b 8f b8 04 00 00 48 81 c7 f0 fa ff ff <48> 8b 41 28 48 29 ce 48 83 c6 d0 48 c1 ee 04 69 d6 ab aa aa aa 48
|
||||
[42021.873931] RSP: 0018:ffff97fe90f03da0 EFLAGS: 00010287
|
||||
[42021.879108] RAX: ffff9406988a8c60 RBX: ffff940e1072d438 RCX: 0000000000000000
|
||||
[42021.886169] RDX: ffff94085f1aa000 RSI: ffff93c6cbbdbcb0 RDI: ffff940c7517aef0
|
||||
[42021.893230] RBP: ffff97fe90f03e70 R08: ffff94085f1aa000 R09: 0000000000000000
|
||||
[42021.900294] R10: ffff94085f1aa000 R11: ffffffffc0775680 R12: ffffffff87ca2530
|
||||
[42021.907355] R13: ffff940651602840 R14: ffff93c6cbbdbcb0 R15: ffff94085f1aa000
|
||||
[42021.914418] FS: 00007fda1a3b9700(0000) GS:ffff94453fb80000(0000) knlGS:0000000000000000
|
||||
[42021.922423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
||||
[42021.928130] CR2: 0000000000000028 CR3: 00000042dcfb8003 CR4: 00000000003726f0
|
||||
[42021.935194] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
|
||||
[42021.942257] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
|
||||
[42021.949324] Call Trace:
|
||||
[42021.951756] <TASK>
|
||||
[42021.953842] [<ffffffff86c58674>] ? show_regs+0x64/0x70
|
||||
[42021.959030] [<ffffffff86c58468>] ? __die+0x78/0xc0
|
||||
[42021.963874] [<ffffffff86c9ef75>] ? page_fault_oops+0x2b5/0x3b0
|
||||
[42021.969749] [<ffffffff87674b92>] ? exc_page_fault+0x1a2/0x3c0
|
||||
[42021.975549] [<ffffffff87801326>] ? asm_exc_page_fault+0x26/0x30
|
||||
[42021.981517] [<ffffffffc0775680>] ? __pfx_show_hw_stats+0x10/0x10 [ib_core]
|
||||
[42021.988482] [<ffffffffc077564e>] ? hw_stat_device_show+0x1e/0x40 [ib_core]
|
||||
[42021.995438] [<ffffffff86ac7f8e>] dev_attr_show+0x1e/0x50
|
||||
[42022.000803] [<ffffffff86a3eeb1>] sysfs_kf_seq_show+0x81/0xe0
|
||||
[42022.006508] [<ffffffff86a11134>] seq_read_iter+0xf4/0x410
|
||||
[42022.011954] [<ffffffff869f4b2e>] vfs_read+0x16e/0x2f0
|
||||
[42022.017058] [<ffffffff869f50ee>] ksys_read+0x6e/0xe0
|
||||
[42022.022073] [<ffffffff8766f1ca>] do_syscall_64+0x6a/0xa0
|
||||
[42022.027441] [<ffffffff8780013b>] entry_SYSCALL_64_after_hwframe+0x78/0xe2
|
||||
|
||||
The problem can be reproduced using the following steps:
|
||||
ip netns add foo
|
||||
ip netns exec foo bash
|
||||
cat /sys/class/infiniband/mlx4_0/hw_counters/*
|
||||
|
||||
The panic occurs because of casting the device pointer into an
|
||||
ib_device pointer using container_of() in hw_stat_device_show() is
|
||||
wrong and leads to a memory corruption.
|
||||
|
||||
However the real problem is that hw counters should never been exposed
|
||||
outside of the non-init net namespace.
|
||||
|
||||
Fix this by saving the index of the corresponding attribute group
|
||||
(it might be 1 or 2 depending on the presence of driver-specific
|
||||
attributes) and zeroing the pointer to hw_counters group for compat
|
||||
devices during the initialization.
|
||||
|
||||
With this fix applied hw_counters are not available in a non-init
|
||||
net namespace:
|
||||
find /sys/class/infiniband/mlx4_0/ -name hw_counters
|
||||
/sys/class/infiniband/mlx4_0/ports/1/hw_counters
|
||||
/sys/class/infiniband/mlx4_0/ports/2/hw_counters
|
||||
/sys/class/infiniband/mlx4_0/hw_counters
|
||||
|
||||
ip netns add foo
|
||||
ip netns exec foo bash
|
||||
find /sys/class/infiniband/mlx4_0/ -name hw_counters
|
||||
analysis: 1. **分析是否与 namespace、cgroup、container 或者容器、隔离相关**
|
||||
- 该 CVE 涉及到网络命名空间(net namespace)的问题。具体来说,硬件计数器(hw_counters)被错误地暴露在非初始网络命名空间中,这可能导致内存损坏或崩溃。因此,这个漏洞与 Linux 命名空间(namespace)直接相关。
|
||||
|
||||
2. **分析是否会导致容器(如 Docker)运行时影响其他容器或宿主机**
|
||||
- 由于问题涉及到网络命名空间,而容器通常使用独立的网络命名空间来实现网络隔离,如果 hw_counters 被错误地暴露给非初始网络命名空间,攻击者可能利用此漏洞访问或修改宿主机或其他容器的资源。尽管当前的修复已经阻止了 hw_counters 在非初始网络命名空间中的访问,但在未修复的情况下,这种行为可能会导致容器逃逸或对宿主机产生影响。
|
||||
|
||||
3. **结论**
|
||||
- 条件 1 和条件 2 都满足,因此返回以下分析结果:
|
||||
- 该 CVE 与 namespace 相关,且可能在特定情况下影响容器的隔离性,导致容器逃逸或影响宿主机的安全性。
|
||||
|
||||
cve: ./data/2025/23xxx/CVE-2025-23211.json
|
||||
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24.
|
||||
analysis: 1. 该 CVE 信息与 namespace、cgroup、container 或容器隔离机制无直接关系。问题的核心是一个 Jinja2 SSTI(Server-Side Template Injection)漏洞,它允许用户在服务器上执行命令。
|
||||
|
||||
2. 尽管这是一个命令执行漏洞,并且提到 Docker Compose 文件,但它本身并不直接影响容器的隔离性或导致一个容器影响其他容器或宿主机。此漏洞的影响范围取决于运行 Tandoor Recipes 应用程序的容器权限配置。如果容器以 root 用户运行并且没有适当的隔离措施,攻击者可能利用该漏洞突破容器并影响宿主机。但这更多是由于错误的容器配置(例如以 root 运行容器)而非漏洞本身的特性。
|
||||
|
||||
3. 综上所述,虽然此漏洞严重,但其本质是一个应用程序层面的问题,而不是容器或隔离机制的漏洞。
|
||||
|
||||
**结论:N/A**
|
||||
|
||||
cve: ./data/2025/27xxx/CVE-2025-27519.json
|
||||
Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或者容器、隔离相关:**
|
||||
是的,该 CVE 信息明确提到 Cognita 在 Docker 环境中运行时存在漏洞。具体来说,当 `Local` 环境变量设置为 `true` 时,路径遍历问题会导致攻击者能够覆盖 `/app/backend/__init__.py` 文件,并触发远程代码执行 (RCE)。这表明该问题与容器(Docker)的运行环境直接相关。
|
||||
|
||||
2. **是否会导致容器(例如 Docker)在运行时影响其他容器或宿主机:**
|
||||
根据描述,攻击者可以利用此漏洞在容器内实现远程代码执行。然而,这种 RCE 的影响范围仅限于当前容器上下文。没有明确提到该漏洞能够突破容器隔离机制(如 namespace 或 cgroup),进而影响其他容器或宿主机。因此,从现有信息来看,该漏洞不会直接影响其他容器或宿主机,除非攻击者进一步利用其他漏洞或配置错误来逃逸容器。
|
||||
|
||||
**结论:**
|
||||
- 满足条件 1(与容器相关)。
|
||||
- 不满足条件 2(不会直接影响其他容器或宿主机)。
|
||||
|
||||
**最终结果:**
|
||||
N/A
|
||||
|
||||
cve: ./data/2025/27xxx/CVE-2025-27615.json
|
||||
umatiGateway is software for connecting OPC Unified Architecture servers with an MQTT broker utilizing JSON messages. The user interface may possibly be publicly accessible with umatiGateway's provided docker-compose file. With this access, the configuration can be viewed and altered. Commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 uses `127.0.0.1:8080:8080` to limit access to the local network. For those who are unable to use this proposed patch, a firewall on Port 8080 may block remote access, but the workaround may not be perfect because Docker may also bypass a firewall by its iptable based rules for port forwarding.
|
||||
analysis: 1. **分析是否与 namespace、cgroup、container 或者容器、隔离相关**:
|
||||
是的,此 CVE 信息与容器相关。具体来说,问题出现在 umatiGateway 提供的 `docker-compose` 文件中,该文件配置了容器的服务暴露方式。由于容器的用户界面可能被公开访问,这表明容器的网络配置或隔离设置存在问题。
|
||||
|
||||
2. **分析是否会导致容器(如 Docker)在运行时影响其他容器或宿主机**:
|
||||
有可能。如果攻击者通过公开访问的用户界面修改了配置,可能会导致以下后果:
|
||||
- 攻击者可以查看或篡改敏感配置,从而影响容器的正常运行。
|
||||
- 如果容器以不安全的方式配置了网络(例如,绕过防火墙规则),攻击者可能利用此漏洞进一步访问宿主机或其他容器。
|
||||
|
||||
因此,此 CVE 可能会影响容器的隔离性,并间接影响宿主机或其他容器的安全性。
|
||||
|
||||
**结论**:满足条件 1 和 2,存在与容器隔离相关的安全风险。
|
||||
|
||||
cve: ./data/2025/2xxx/CVE-2025-2312.json
|
||||
A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或容器、隔离相关**:
|
||||
是的,该 CVE 信息明确提到问题发生在容器化环境中,并且涉及命名空间(namespace)的错误使用。具体来说,`cifs.upcall` 程序在容器中尝试获取 Kerberos 凭据时,错误地向上调用到了主机的命名空间,而不是容器的命名空间。
|
||||
|
||||
2. **是否会导致容器(如 Docker)在运行时影响其他容器或宿主机**:
|
||||
是的,该漏洞可能导致容器内的程序访问到宿主机的 Kerberos 凭据缓存,从而泄露敏感数据。这表明容器的隔离性被破坏,攻击者可能利用此漏洞从容器内获取宿主机的敏感信息。
|
||||
|
||||
3. **结论**:
|
||||
条件 1 和条件 2 均满足,因此返回上述分析内容。
|
||||
|
||||
cve: ./data/2025/30xxx/CVE-2025-30162.json
|
||||
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads covered by such network policies to LoadBalancers configured by `Gateway` resources will incorrectly be allowed. LoadBalancer resources not deployed via a Gateway API configuration are not affected by this issue. This issue affects: Cilium v1.15 between v1.15.0 and v1.15.14 inclusive, v1.16 between v1.16.0 and v1.16.7 inclusive, and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.15.15, v1.16.8, and v1.17.2. A Clusterwide Cilium Network Policy can be used to work around this issue for users who are unable to upgrade.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或者容器、隔离相关**:
|
||||
是的,这个 CVE 信息与 namespace 和容器隔离相关。问题描述中提到网络策略(network policies)用于阻止某个命名空间(namespace)中的工作负载(workloads)到其他命名空间中的工作负载的出口流量(egress traffic)。这表明它涉及到基于命名空间的网络隔离。
|
||||
|
||||
2. **是否会导致容器(例如 Docker 等)在运行时影响其他容器或宿主机**:
|
||||
不会直接影响其他容器或宿主机。此漏洞导致的问题是特定的网络策略未能正确阻止从某些工作负载到通过 `Gateway` 资源配置的 LoadBalancer 的出口流量。这种行为可能会破坏预期的网络隔离,但并不会直接导致容器逃逸或影响宿主机的安全性。
|
||||
|
||||
3. **结论**:
|
||||
条件 1 满足,条件 2 不满足,因此返回分析结果而不是 "N/A"。
|
||||
|
||||
cve: ./data/2025/30xxx/CVE-2025-30206.json
|
||||
Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.
|
||||
analysis: 1. 该 CVE 信息与 namespace、cgroup、container 或容器隔离机制无直接关系。问题的核心是 Dpanel 服务中硬编码的 JWT 密钥,这属于应用层的安全配置问题,而非容器或隔离技术本身的漏洞。
|
||||
2. 该 CVE 可能会导致攻击者在成功利用后影响宿主机,但其本身并不会直接影响其他容器。由于攻击者可以通过伪造的 JWT 令牌获得对 Dpanel 的完全控制,而 Dpanel 是一个用于管理 Docker 的工具,因此攻击者可能间接通过 Dpanel 操控宿主机上的其他容器或宿主机本身。
|
||||
|
||||
结论:满足条件 2,返回分析结果。
|
||||
|
||||
cve: ./data/2025/32xxx/CVE-2025-32754.json
|
||||
In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或者容器、隔离相关:**
|
||||
是的,该 CVE 与容器和隔离相关。问题发生在基于 Debian 的 Jenkins/ssh-agent Docker 镜像中,SSH 主机密钥在镜像创建时生成,而不是在容器启动时动态生成。这导致所有基于相同版本镜像的容器共享相同的 SSH 主机密钥,破坏了容器之间的隔离性。
|
||||
|
||||
2. **是否会导致容器(例如 Docker)在运行时影响其他容器或宿主机:**
|
||||
是的,此漏洞可能导致容器影响其他容器的安全性。由于所有容器共享相同的 SSH 主机密钥,攻击者可以通过网络插入攻击(如中间人攻击)冒充 SSH 构建代理,从而破坏通信的安全性。虽然它本身不会直接影响宿主机,但通过破坏容器间的通信安全,可能会间接影响宿主机上的其他服务或资源。
|
||||
|
||||
因此,条件 1 和 2 均满足。
|
||||
|
||||
cve: ./data/2025/32xxx/CVE-2025-32755.json
|
||||
In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter.
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关**:
|
||||
是的,该CVE明确提到了Docker镜像和容器。问题发生在基于Debian的`jenkins/ssh-slave` Docker镜像中,由于SSH主机密钥在镜像构建时生成,所有基于同一版本镜像创建的容器共享相同的SSH主机密钥。这表明该问题与容器技术及其隔离机制直接相关。
|
||||
|
||||
2. **是否会导致容器(例如Docker等)在运行时影响其他容器或宿主机**:
|
||||
是的,该漏洞会导致安全风险。由于所有基于相同镜像的容器共享相同的SSH主机密钥,攻击者可以通过网络中间人攻击(MITM)冒充SSH构建代理,从而破坏容器之间的通信安全性。虽然此漏洞本身不会直接影响宿主机,但它会削弱容器间的隔离性,使得攻击者能够更容易地渗透到其他容器或整个CI/CD管道中。
|
||||
|
||||
**结论**:满足条件1和条件2,分析完毕。
|
||||
|
||||
cve: ./data/2025/32xxx/CVE-2025-32955.json
|
||||
Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Versions from 0.12.0 to before 2.12.0 are vulnerable to `disable-sudo` bypass. Harden-Runner includes a policy option `disable-sudo` to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction. This issue has been patched in version 2.12.0.
|
||||
analysis: 1. **分析是否与 namespace、cgroup、container 或者容器、隔离相关**:
|
||||
是的,该 CVE 信息与容器和隔离相关。问题的核心在于 Harden-Runner 的 `disable-sudo` 功能被绕过,原因是 GitHub Actions 运行器用户属于 `docker` 组,能够与 Docker 守护进程交互,从而启动特权容器或访问宿主机文件系统。这表明问题涉及容器技术以及其与宿主机之间的隔离机制。
|
||||
|
||||
2. **分析是否会导致容器(如 Docker)在运行时影响其他容器或宿主机**:
|
||||
是的,该漏洞可能导致容器运行时影响宿主机。由于攻击者可以利用 Docker 守护进程启动特权容器或直接访问宿主机文件系统,这种行为可能会破坏容器与宿主机之间的隔离性,进而允许攻击者获得宿主机的 root 权限或恢复 `sudoers` 文件,最终完全控制宿主机。
|
||||
|
||||
**结论**:满足条件 1 和 2。
|
||||
|
||||
cve: ./data/2025/3xxx/CVE-2025-3047.json
|
||||
When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container.
|
||||
|
||||
Users should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes.
|
||||
analysis: 1. **是否与namespace、cgroup、container或者容器、隔离相关**:
|
||||
是的,该CVE与容器和隔离相关。问题发生在使用AWS SAM CLI通过Docker构建应用的过程中,涉及容器环境中的权限提升和文件访问问题。
|
||||
|
||||
2. **是否会导致容器(例如Docker等)在运行时影响其他容器或宿主机**:
|
||||
是的,该漏洞可能导致容器内的用户通过符号链接(symlinks)访问宿主机上的特权文件。这种行为破坏了容器与宿主机之间的隔离性,可能会对宿主机或其他共享宿主机资源的容器造成影响。
|
||||
|
||||
因此,该CVE满足条件1和条件2。
|
||||
|
||||
cve: ./data/2025/3xxx/CVE-2025-3048.json
|
||||
After completing a build with AWS Serverless Application Model Command Line Interface (SAM CLI) which include symlinks, the content of those symlinks are copied to the cache of the local workspace as regular files or directories. As a result, a user who does not have access to those symlinks outside of the Docker container would now have access via the local workspace.
|
||||
|
||||
Users should upgrade to version 1.134.0 and ensure any forked or derivative code is patched to incorporate the new fixes. After upgrading, users must re-build their applications using the sam build --use-container to update the symlinks.
|
||||
analysis: 1. **是否与 namespace、cgroup、container 或者容器、隔离相关**:
|
||||
是的,该 CVE 与容器相关。问题描述中明确提到 AWS SAM CLI 在构建过程中将符号链接(symlinks)的内容复制到本地工作区缓存中,并且这些内容在 Docker 容器内被处理。
|
||||
|
||||
2. **是否会导致容器(例如 Docker 等)在运行时影响其他容器或宿主机**:
|
||||
是的,可能会对隔离性造成影响。虽然该漏洞本身不会直接破坏容器的隔离机制(如 namespace 或 cgroup),但它导致了原本无法访问的符号链接内容可以通过容器内的操作暴露到本地工作区。这可能使得攻击者通过特定方式获取到原本受限的文件内容,从而间接影响宿主机或其他容器的安全性。
|
||||
|
||||
**结论**:满足条件 1 和 2。
|
||||
Reference in New Issue
Block a user