runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html - Broken Link, Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0688 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0695 - Third Party Advisory | |
References | () https://github.com/opencontainers/runc/issues/2197 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/opencontainers/runc/pull/2190 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/opencontainers/runc/releases - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/ - | |
References | () https://security-tracker.debian.org/tracker/CVE-2019-19921 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-21 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4297-1/ - Third Party Advisory |
07 Nov 2023, 03:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
16 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-02-12 15:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19921
Mitre link : CVE-2019-19921
CVE.ORG link : CVE-2019-19921
JSON object : View
Products Affected
canonical
- ubuntu_linux
linuxfoundation
- runc
opensuse
- leap
redhat
- openshift_container_platform
debian
- debian_linux
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference