First published: Wed Mar 29 2023(Updated: )
### Impact It was found that AppArmor, and potentially SELinux, can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. ### Patches Fixed in runc v1.1.5, by prohibiting symlinked `/proc`: https://github.com/opencontainers/runc/pull/3785 This PR fixes CVE-2023-27561 as well. ### Workarounds Avoid using an untrusted container image.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/runc | <1.1.5 | 1.1.5 |
Linuxfoundation Runc | <1.1.5 | |
debian/runc | <=1.0.0~rc93+ds1-5+deb11u3 | 1.0.0~rc93+ds1-5+deb11u5 1.1.5+ds1-1+deb12u1 1.1.15+ds1-1 |
go/github.com/opencontainers/runc | <1.1.5 | 1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28642 is a vulnerability found in the runc CLI tool, which allows bypassing of AppArmor security when `/proc` inside a container is symlinked with a specific mount configuration.
CVE-2023-28642 has a severity rating of medium with a severity value of 4.
The CVE-2023-28642 vulnerability can be fixed by upgrading to runc version 1.1.5 or higher.
You can find more information about CVE-2023-28642 on the official GitHub page of runc and the Open Containers Initiative (OCI) security advisories.
The affected software for CVE-2023-28642 includes runc version 1.0.0~ up to but excluding 1.1.5.