-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in github.com/opencontainers/runc: CVE-2023-28642 #1683
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Comments
maceonthompson
added
the
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
label
Mar 30, 2023
Change https://go.dev/cl/480716 mentions this issue: |
Change https://go.dev/cl/592760 mentions this issue: |
Change https://go.dev/cl/606784 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Aug 20, 2024
- data/reports/GO-2023-1643.yaml - data/reports/GO-2023-1644.yaml - data/reports/GO-2023-1651.yaml - data/reports/GO-2023-1652.yaml - data/reports/GO-2023-1653.yaml - data/reports/GO-2023-1654.yaml - data/reports/GO-2023-1655.yaml - data/reports/GO-2023-1656.yaml - data/reports/GO-2023-1657.yaml - data/reports/GO-2023-1658.yaml - data/reports/GO-2023-1659.yaml - data/reports/GO-2023-1660.yaml - data/reports/GO-2023-1661.yaml - data/reports/GO-2023-1662.yaml - data/reports/GO-2023-1670.yaml - data/reports/GO-2023-1671.yaml - data/reports/GO-2023-1682.yaml - data/reports/GO-2023-1683.yaml - data/reports/GO-2023-1685.yaml - data/reports/GO-2023-1699.yaml Updates #1643 Updates #1644 Updates #1651 Updates #1652 Updates #1653 Updates #1654 Updates #1655 Updates #1656 Updates #1657 Updates #1658 Updates #1659 Updates #1660 Updates #1661 Updates #1662 Updates #1670 Updates #1671 Updates #1682 Updates #1683 Updates #1685 Updates #1699 Change-Id: Iddcfb6c5438e03827049eecbf0a95fae6c078436 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/606784 Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]>
This was referenced Sep 3, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
CVE-2023-28642 references github.com/opencontainers/runc, which may be a Go module.
Description:
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when
/proc
inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked/proc
. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: