runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3322-1 golang-github-opencontainers-selinux security update
Debian DLA Debian DLA DLA-3369-1 runc security update
EUVD EUVD EUVD-2022-0981 runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
Github GHSA Github GHSA GHSA-fgv8-vj5c-2ppq Incorrect Authorization in runc
Ubuntu USN Ubuntu USN USN-4297-1 runC vulnerabilities
Ubuntu USN Ubuntu USN USN-4867-1 runC vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:24:48.342Z

Reserved: 2019-09-25T00:00:00

Link: CVE-2019-16884

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-25T18:15:13.057

Modified: 2024-11-21T04:31:16.327

Link: CVE-2019-16884

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-09-22T00:00:00Z

Links: CVE-2019-16884 - Bugzilla

cve-icon OpenCVE Enrichment

No data.