Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fgv8-vj5c-2ppq

Опубликовано: 22 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Incorrect Authorization in runc

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Пакеты

Наименование

github.com/opencontainers/runc

go
Затронутые версииВерсия исправления

< 1.0.0-rc8.0.20190930145003-cad42f6e0932

1.0.0-rc8.0.20190930145003-cad42f6e0932

Наименование

github.com/opencontainers/selinux

go
Затронутые версииВерсия исправления

< 1.3.1-0.20190929122143-5215b1806f52

1.3.1-0.20190929122143-5215b1806f52

EPSS

Процентиль: 53%
0.00301
Низкий

7.5 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
redhat
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
nvd
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 7.5
debian
больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other ...

EPSS

Процентиль: 53%
0.00301
Низкий

7.5 High

CVSS3

Дефекты

CWE-863