runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
References
Link | Resource |
---|---|
https://github.com/opencontainers/runc/issues/2197 | Issue Tracking Patch Third Party Advisory |
https://github.com/opencontainers/runc/pull/2190 | Issue Tracking Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2019-19921 | Third Party Advisory |
https://github.com/opencontainers/runc/releases | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html | Broken Link Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0688 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0695 | Third Party Advisory |
https://security.gentoo.org/glsa/202003-21 | Third Party Advisory |
https://usn.ubuntu.com/4297-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-02-12 07:15
Updated : 2023-03-01 08:40
NVD link : CVE-2019-19921
Mitre link : CVE-2019-19921
JSON object : View
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference
Products Affected
linuxfoundation
- runc
canonical
- ubuntu_linux
opensuse
- leap
redhat
- openshift_container_platform
debian
- debian_linux