CVE-2023-28642
CVSS V2 None
CVSS V3 None
Description
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
Overview
- CVE ID
- CVE-2023-28642
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-29T19:15:22
- Last Modified Date
- 2023-04-06T17:45:27
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* | 1 | OR | 1.1.5 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/opencontainers/runc/pull/3785 | Patch |
https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c | Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28642 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:53:16 | Added to TrackCVE | |||
2023-04-17 03:53:18 | Weakness Enumeration | new |