Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-28642

Опубликовано: 29 мар. 2023
Источник: debian
EPSS Низкий

Описание

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
runcfixed1.1.5+ds1-1package
runcfixed1.0.0~rc93+ds1-5+deb11u5bullseyepackage

Примечания

  • https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c

  • https://github.com/opencontainers/runc/pull/3785

  • same fix as CVE-2023-27561

EPSS

Процентиль: 1%
0.00011
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 7.8
redhat
около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
nvd
около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 7.8
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 6.1
github
около 2 лет назад

runc AppArmor bypass with symlinked /proc

EPSS

Процентиль: 1%
0.00011
Низкий