runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
16 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Apr 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Mar 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2023, 16:40
Type | Values Removed | Values Added |
---|---|---|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0695 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html - Broken Link, Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4297-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0688 - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202003-21 - Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:* |
Information
Published : 2020-02-12 15:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-19921
Mitre link : CVE-2019-19921
CVE.ORG link : CVE-2019-19921
JSON object : View
Products Affected
debian
- debian_linux
linuxfoundation
- runc
redhat
- openshift_container_platform
canonical
- ubuntu_linux
opensuse
- leap
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference