{"id":"AZL-25850","summary":"CVE-2023-28642 affecting package moby-runc for versions less than 1.1.5-1","details":"runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.\n\n","modified":"2026-04-01T05:08:06.330571Z","published":"2023-03-29T19:15:22Z","upstream":["CVE-2023-28642"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28642"}],"affected":[{"package":{"name":"moby-runc","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/moby-runc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.5-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-25850.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}