Description
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3322-1 | golang-github-opencontainers-selinux security update |
Debian DLA |
DLA-3369-1 | runc security update |
EUVD |
EUVD-2022-0981 | runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. |
Github GHSA |
GHSA-fgv8-vj5c-2ppq | Incorrect Authorization in runc |
Ubuntu USN |
USN-4297-1 | runC vulnerabilities |
Ubuntu USN |
USN-4867-1 | runC vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Docker
Subscribe
Docker
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Linuxfoundation
Subscribe
Runc
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Openshift
Subscribe
Openshift Container Platform
Subscribe
Rhel Extras Other
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:24:48.342Z
Reserved: 2019-09-25T00:00:00.000Z
Link: CVE-2019-16884
No data.
Status : Modified
Published: 2019-09-25T18:15:13.057
Modified: 2024-11-21T04:31:16.327
Link: CVE-2019-16884
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN