CVE-2019-16884
Severity
7.5HIGH
EPSS
0.3%
top 42.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 25
Latest updateNov 24
Description
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Also affects: Fedora 29, 30, 31, Ubuntu Linux 18.04, 19.10, Enterprise Linux 8.0, 8.1, 8.2, 8.4, Openshift Container Platform 4.1, 4.2
🔴Vulnerability Details
9📋Vendor Advisories
5Red Hat
▶
Microsoft▶
runc through 1.0.0-rc8 as used in Docker through 19.03.2-ce and other products allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets and thus a malic↗2019-09-10
Debian▶
CVE-2019-16884: golang-github-opencontainers-selinux - runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products,...↗2019
💬Community
4Bugzilla▶
CVE-2019-16884 docker: runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc [openstack-rdo]↗2019-10-11
Bugzilla▶
CVE-2019-16884 docker: runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc [fedora-all]↗2019-10-11
Bugzilla▶
CVE-2019-16884 runc: AppArmor can be bypassed by a malicious image that specifies a volume at /proc [fedora-all]↗2019-10-01
Bugzilla▶
CVE-2019-16884 runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc↗2019-09-30