CVE-2023-28642

ADVISORY - github

Summary

Impact

It was found that AppArmor, and potentially SELinux, can be bypassed when /proc inside the container is symlinked with a specific mount configuration.

Patches

Fixed in runc v1.1.5, by prohibiting symlinked /proc: https://github.com/opencontainers/runc/pull/3785

This PR fixes CVE-2023-27561 as well.

Workarounds

Avoid using an untrusted container image.

EPSS Score: 0.00011 (0.010)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Preservation of Permissions

Improper Link Resolution Before File Access ('Link Following')

ADVISORY - github

Improper Preservation of Permissions

Improper Link Resolution Before File Access ('Link Following')

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Improper Preservation of Permissions

Improper Link Resolution Before File Access ('Link Following')

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Authentication Bypass by Primary Weakness


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in