It was found that AppArmor, and potentially SELinux, can be bypassed when /proc
inside the container is symlinked with a specific mount configuration.
Fixed in runc v1.1.5, by prohibiting symlinked /proc
: https://github.com/opencontainers/runc/pull/3785
This PR fixes CVE-2023-27561 as well.
Avoid using an untrusted container image.
{ "nvd_published_at": "2023-03-29T19:15:00Z", "cwe_ids": [ "CWE-281", "CWE-59" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-03-30T20:20:23Z" }