Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fgv8-vj5c-2ppq

Опубликовано: 22 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Incorrect Authorization in runc

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Пакеты

Наименование

github.com/opencontainers/runc

go
Затронутые версииВерсия исправления

< 1.0.0-rc8.0.20190930145003-cad42f6e0932

1.0.0-rc8.0.20190930145003-cad42f6e0932

Наименование

github.com/opencontainers/selinux

go
Затронутые версииВерсия исправления

< 1.3.1-0.20190929122143-5215b1806f52

1.3.1-0.20190929122143-5215b1806f52

EPSS

Процентиль: 51%
0.00277
Низкий

7.5 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
redhat
около 6 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
nvd
около 6 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
около 6 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other ...

EPSS

Процентиль: 51%
0.00277
Низкий

7.5 High

CVSS3

Дефекты

CWE-863