CVE-2023-28642
Description
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
CWE
- CWE-281 — CWE-281: Improper Preservation of Permissions
Affected
- opencontainers / runc — v=< 1.1.5 [affected]
CVSS
- 3.1 score=6.1 severity=MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
References
- https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c x_refsource_CONFIRM
- https://github.com/opencontainers/runc/pull/3785 x_refsource_MISC
Source
cvelistV5-main/cves/2023/28xxx/CVE-2023-28642.json