CVE-2023-38496: Ineffective privileges drop when requesting container network
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.12427%
CWE
Published
7/25/2023
Updated
11/5/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/apptainer/apptainer | go | >= 1.2.0, < 1.2.1 | 1.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper privilege management in setuid operations introduced in PR #1523 and fixed in PR #1578. The key functions handling privilege escalation/dropping (Escalate/Drop in priv_linux.go) were modified in the fix to restore proper setresuid behavior. The original implementation's use of syscall.Setresuid without thread-locking considerations left privileged operations active, matching the CWE-269 (Improper Privilege Management) classification. The direct correlation between the vulnerability description, CWE mapping, and the patched functions in the referenced PRs provides high confidence.