runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Fedoraproject Subscribe
Linuxfoundation Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server Tus Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Rhel Extras Other Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3322-1 golang-github-opencontainers-selinux security update
Debian DLA Debian DLA DLA-3369-1 runc security update
EUVD EUVD EUVD-2022-0981 runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
Github GHSA Github GHSA GHSA-fgv8-vj5c-2ppq Incorrect Authorization in runc
Ubuntu USN Ubuntu USN USN-4297-1 runC vulnerabilities
Ubuntu USN Ubuntu USN USN-4867-1 runC vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:24:48.342Z

Reserved: 2019-09-25T00:00:00

Link: CVE-2019-16884

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-25T18:15:13.057

Modified: 2024-11-21T04:31:16.327

Link: CVE-2019-16884

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-09-22T00:00:00Z

Links: CVE-2019-16884 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses