Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-25850.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-25850
Upstream
Published
2023-03-29T19:15:22Z
Modified
2026-04-01T05:08:06.330571Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
CVE-2023-28642 affecting package moby-runc for versions less than 1.1.5-1
Details

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when /proc inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked /proc. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

References

Affected packages

Azure Linux:2 / moby-runc

Package

Name
moby-runc
Purl
pkg:rpm/azure-linux/moby-runc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.5-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-25850.json"