7

CVE-2019-19921

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)

Data is provided by the National Vulnerability Database (NVD)
LinuxfoundationRunc Version <= 0.1.1
LinuxfoundationRunc Version1.0.0 Updaterc1
LinuxfoundationRunc Version1.0.0 Updaterc2
LinuxfoundationRunc Version1.0.0 Updaterc3
LinuxfoundationRunc Version1.0.0 Updaterc4
LinuxfoundationRunc Version1.0.0 Updaterc5
LinuxfoundationRunc Version1.0.0 Updaterc6
LinuxfoundationRunc Version1.0.0 Updaterc7
LinuxfoundationRunc Version1.0.0 Updaterc8
LinuxfoundationRunc Version1.0.0 Updaterc9
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
OpensuseLeap Version15.1
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.471
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-706 Use of Incorrectly-Resolved Name or Reference

The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.

https://usn.ubuntu.com/4297-1/
Third Party Advisory
https://github.com/opencontainers/runc/issues/2197
Patch
Third Party Advisory
Issue Tracking
https://github.com/opencontainers/runc/pull/2190
Third Party Advisory
Issue Tracking