Jan 1, 2026·6 min read·1 visit
runc < 1.1.5 allows container images to replace the `/proc` directory with a symbolic link. This confuses path-based security modules like AppArmor, causing them to fail to apply or enforce profiles correctly. An attacker can use this to bypass confinement and access sensitive host resources.
A vulnerability in runc allowing attackers to bypass AppArmor and SELinux profiles by crafting container images with a symlinked /proc directory, effectively blinding the host's security controls.
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L| Product | Affected Versions | Fixed Version |
|---|---|---|
runc Open Container Initiative | < 1.1.5 | 1.1.5 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-281 |
| Attack Vector | Local (Image-based) |
| CVSS | 6.1 (Medium) |
| Privileges Required | None (User Interaction) |
| User Interaction | Required (Victim must run image) |
| Impact | Security Bypass (AppArmor/SELinux) |
Improper Preservation of Permissions