runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T16:02:53.406Z
Reserved: 2023-03-20T12:19:47.209Z
Link: CVE-2023-28642

Updated: 2024-12-06T13:09:24.993Z

Status : Modified
Published: 2023-03-29T19:15:22.397
Modified: 2024-12-06T14:15:19.250
Link: CVE-2023-28642
