Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28642
HistoryMar 29, 2023 - 12:00 a.m.

CVE-2023-28642

2023-03-2900:00:00
ubuntu.com
ubuntu.com
11

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

8.3%

runc is a CLI tool for spawning and running containers according to the OCI
specification. It was found that AppArmor can be bypassed when /proc
inside the container is symlinked with a specific mount configuration. This
issue has been fixed in runc version 1.1.5, by prohibiting symlinked
/proc. See PR #3785 for details. users are advised to upgrade. Users
unable to upgrade should avoid using an untrusted container image.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchrunc<ย 1.1.4-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchrunc<ย 1.1.4-0ubuntu1~20.04.3UNKNOWN
ubuntu22.04noarchrunc<ย 1.1.4-0ubuntu1~22.04.3UNKNOWN
ubuntu22.10noarchrunc<ย 1.1.4-0ubuntu1~22.10.3UNKNOWN
ubuntu23.04noarchrunc<ย 1.1.4-0ubuntu3.1UNKNOWN
ubuntu16.04noarchrunc<ย 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm4UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

8.3%