Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16884

Опубликовано: 25 сент. 2019
Источник: debian

Описание

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
runcfixed1.0.0~rc9+dfsg1-1package
runcno-dsastretchpackage
golang-github-opencontainers-selinuxfixed1.3.0-2package

Примечания

  • https://github.com/opencontainers/runc/issues/2128

  • https://github.com/opencontainers/runc/commit/331692baa7afdf6c186f8667cb0e6362ea0802b3 (v1.0.0-rc9)

  • runc mitigation: https://github.com/opencontainers/runc/pull/2130 (v1.0.0-rc9)

  • golang-github-opencontainers-selinux mitigation: https://github.com/opencontainers/selinux/pull/59 (v1.3.1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
redhat
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
nvd
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
msrc
почти 4 года назад

Описание отсутствует

suse-cvrf
больше 5 лет назад

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork