runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
References
Configurations
History
06 Dec 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/opencontainers/runc/pull/3785 - Patch | |
References | () https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
29 Mar 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-29 19:15
Updated : 2024-12-06 14:15
NVD link : CVE-2023-28642
Mitre link : CVE-2023-28642
CVE.ORG link : CVE-2023-28642
JSON object : View
Products Affected
linuxfoundation
- runc