CVE-2019-16884
Published: 25 September 2019
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
From the Ubuntu security team
It was discovered that runC incorrectly implemented AppArmor restrictions. An attacker could possibly use this issue to mount malicious images.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
runc Launchpad, Ubuntu, Debian |
bionic |
Released
(1.0.0~rc10-0ubuntu1~18.04.2)
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
focal |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
groovy |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
hirsute |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
impish |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
jammy |
Released
(1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.0.0~rc9)
|
|
xenial |
Ignored
(end of standard support, was needed)
|