First published: Sun Sep 22 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/runc | <0:1.0.0-67.rc10.el7_8 | 0:1.0.0-67.rc10.el7_8 |
redhat/docker | <2:1.13.1-161.git64e9980.el7_8 | 2:1.13.1-161.git64e9980.el7_8 |
redhat/runc | <0:1.0.0-62.rc8.rhaos4.1.git3cbe540.el8 | 0:1.0.0-62.rc8.rhaos4.1.git3cbe540.el8 |
redhat/runc | <0:1.0.0-63.rc8.el8 | 0:1.0.0-63.rc8.el8 |
Linuxfoundation Runc | >=0.0.1<=0.1.1 | |
Linuxfoundation Runc | =1.0.0-rc1 | |
Linuxfoundation Runc | =1.0.0-rc2 | |
Linuxfoundation Runc | =1.0.0-rc3 | |
Linuxfoundation Runc | =1.0.0-rc4 | |
Linuxfoundation Runc | =1.0.0-rc5 | |
Linuxfoundation Runc | =1.0.0-rc6 | |
Linuxfoundation Runc | =1.0.0-rc7 | |
Linuxfoundation Runc | =1.0.0-rc8 | |
Docker Docker | <=19.03.2 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Openshift Container Platform | =4.1 | |
Redhat Openshift Container Platform | =4.2 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
go/github.com/opencontainers/selinux | <1.3.1-0.20190929122143-5215b1806f52 | 1.3.1-0.20190929122143-5215b1806f52 |
go/github.com/opencontainers/runc | <1.0.0-rc8.0.20190930145003-cad42f6e0932 | 1.0.0-rc8.0.20190930145003-cad42f6e0932 |
debian/golang-github-opencontainers-selinux | 1.8.0-1 1.10.0+ds1-1 1.11.1-1 | |
debian/runc | 1.0.0~rc93+ds1-5+deb11u5 1.0.0~rc93+ds1-5+deb11u3 1.1.5+ds1-1+deb12u1 1.1.15+ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this vulnerability is CVE-2019-16884.
The severity rating of CVE-2019-16884 is medium, with a severity value of 6.5.
The affected software for CVE-2019-16884 includes runc versions 1.0.0-rc8 and earlier, used in Docker versions through 19.03.2-ce.
CVE-2019-16884 allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, allowing a malicious Docker image to mount over a /proc directory.
Yes, there are references available for CVE-2019-16884: [Reference 1](https://github.com/opencontainers/runc/issues/2128), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/)