It was found that AppArmor can be bypassed when /proc
inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked /proc
. Users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
It was found that AppArmor can be bypassed when
/proc
inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked/proc
. Users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.