Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28642
HistoryMar 29, 2023 - 12:00 a.m.

CVE-2023-28642

2023-03-2900:00:00
ubuntu.com
ubuntu.com
14
runc
apparmor bypass
symlink vulnerability
upgrade
untrusted container image
security risk

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

runc is a CLI tool for spawning and running containers according to the OCI
specification. It was found that AppArmor can be bypassed when /proc
inside the container is symlinked with a specific mount configuration. This
issue has been fixed in runc version 1.1.5, by prohibiting symlinked
/proc. See PR #3785 for details. users are advised to upgrade. Users
unable to upgrade should avoid using an untrusted container image.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchrunc<ย 1.1.4-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchrunc<ย 1.1.4-0ubuntu1~20.04.3UNKNOWN
ubuntu22.04noarchrunc<ย 1.1.4-0ubuntu1~22.04.3UNKNOWN
ubuntu22.10noarchrunc<ย 1.1.4-0ubuntu1~22.10.3UNKNOWN
ubuntu23.04noarchrunc<ย 1.1.4-0ubuntu3.1UNKNOWN
ubuntu16.04noarchrunc<ย 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm4UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%