Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-28642

Опубликовано: 29 мар. 2023
Источник: redhat
CVSS3: 7.8

Описание

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when /proc inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked /proc. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

A flaw was found in runc. This vulnerability could allow a remote attacker to bypass security restrictions and create a symbolic link inside a container to the /proc directory, bypassing AppArmor and SELinux protections.

Отчет

The symlink vulnerability in runc allowing for the bypassing of AppArmor protections by manipulating the /proc symlink poses a moderate severity issue due to its potential impact on container isolation and security boundaries. While the exploitation requires specific mount configurations and access to the container's filesystem, it can lead to unauthorized access to host resources and potential privilege escalation within the containerized environment. This could enable attackers to compromise the integrity and confidentiality of other containers or the host system. Although the vulnerability does not allow direct remote code execution, its exploitation can result in significant security risks within containerized infrastructures, warranting a moderate severity rating.

Меры по смягчению последствий

Avoid using an untrusted container image.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7runcWill not fix
Red Hat Enterprise Linux 8container-tools:3.0/runcAffected
Red Hat OpenShift Container Platform 3.11atomic-openshiftOut of support scope
Red Hat OpenShift Container Platform 3.11runcOut of support scope
Red Hat OpenShift Container Platform 4microshiftNot affected
Red Hat OpenShift Container Platform 4openshiftNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-podNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-testsNot affected
Red Hat OpenShift Container Platform 4runcNot affected
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2023:693814.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=2182883runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 6.1
nvd
около 2 лет назад

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVSS3: 7.8
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 6.1
debian
около 2 лет назад

runc is a CLI tool for spawning and running containers according to th ...

CVSS3: 6.1
github
около 2 лет назад

runc AppArmor bypass with symlinked /proc

7.8 High

CVSS3

Уязвимость CVE-2023-28642