Miggo Logo

GHSA-jq35-85cj-fj4p: /sys/devices/virtual/powercap accessible by default to containers

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
10/30/2023
Updated
12/27/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/docker/dockergo>= 24.0.0, < 24.0.724.0.7
github.com/docker/dockergo>= 21.0.0, < 23.0.823.0.8
github.com/docker/dockergo< 20.10.2720.10.27

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two security control failures: 1) The OCI spec generation (DefaultLinuxSpec in oci/defaults.go) didn't mask the powercap sysfs path by default 2) The AppArmor profile template didn't explicitly deny access to this path. These omissions allowed containerized processes to read RAPL metrics through sysfs. The commit diff shows both locations were patched by adding powercap restrictions, confirming these were the vulnerable points. The functions directly control container security boundaries and default access permissions to sensitive system interfaces.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Int*l's R*PL (Runnin* *v*r*** Pow*r Limit) ***tur*, intro*u*** *y t** S*n*y *ri*** mi*ro*r**it**tur*, provi**s so*tw*r* insi**ts into **r*w*r* *n*r*y *onsumption. To ***ilit*t* t*is, Int*l intro*u*** t** pow*r**p *r*m*work in Linux k*rn*l *.**, w*i**

Reasoning

T** vuln*r**ility st*ms *rom two s**urity *ontrol **ilur*s: *) T** O*I sp** **n*r*tion (`****ultLinuxSp**` in `o*i/****ults.*o`) *i*n't m*sk t** pow*r**p sys*s p*t* *y ****ult *) T** *pp*rmor pro*il* t*mpl*t* *i*n't *xpli*itly **ny ****ss to t*is p*t