AppArmor bypass with symlinked /proc in runc
CVE-2023-28642

6.1MEDIUM

Key Information:

Status
Vendor
CVE Published:
29 March 2023

What is CVE-2023-28642?

A security issue has been identified in runc, a widely used command-line interface for managing containers according to the OCI specification. The vulnerability arises when the /proc directory within a container is symlinked under specific mount configurations, allowing for potential AppArmor bypass. To mitigate this risk, the latest version of runc (1.1.5) has introduced measures to prevent symlinked /proc directories. Users are strongly advised to upgrade to this version to enhance their container security. For those unable to apply the update, it is crucial to avoid running container images from untrusted sources.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

runc < 1.1.5

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.