CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
17.0%
Issue Overview:
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.) (CVE-2019-19921)
Affected Packages:
runc
Issue Correction:
Run yum update runc to update your system.
New Packages:
src:
runc-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.src
x86_64:
runc-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64
runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64
Red Hat: CVE-2019-19921
Mitre: CVE-2019-19921
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | x86_64 | runc | < 1.0.0-0.1.20200204.gitdc9208a.1.amzn1 | runc-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | runc-debuginfo | < 1.0.0-0.1.20200204.gitdc9208a.1.amzn1 | runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64.rpm |
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
17.0%