Description
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1007 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image. |
Github GHSA |
GHSA-g2j6-57v7-gm8c | runc AppArmor bypass with symlinked /proc |
Ubuntu USN |
USN-6088-1 | runC vulnerabilities |
Ubuntu USN |
USN-6088-2 | runC vulnerabilities |
References
History
Wed, 12 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T16:02:53.406Z
Reserved: 2023-03-20T12:19:47.209Z
Link: CVE-2023-28642
Updated: 2024-12-06T13:09:24.993Z
Status : Modified
Published: 2023-03-29T19:15:22.397
Modified: 2024-12-06T14:15:19.250
Link: CVE-2023-28642
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN