Lucene search

K
cve[email protected]CVE-2019-16884
HistorySep 25, 2019 - 6:15 p.m.

CVE-2019-16884

2019-09-2518:15:13
CWE-863
web.nvd.nist.gov
234
2
cve-2019-16884
runc
docker
apparmor
security
bypass
mount
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.8%

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Affected configurations

NVD
Node
linuxfoundationruncRange0.0.1โ€“0.1.1
OR
linuxfoundationruncMatch1.0.0rc1
OR
linuxfoundationruncMatch1.0.0rc2
OR
linuxfoundationruncMatch1.0.0rc3
OR
linuxfoundationruncMatch1.0.0rc4
OR
linuxfoundationruncMatch1.0.0rc5
OR
linuxfoundationruncMatch1.0.0rc6
OR
linuxfoundationruncMatch1.0.0rc7
OR
linuxfoundationruncMatch1.0.0rc8
Node
dockerdockerRangeโ‰ค19.03.2community
Node
fedoraprojectfedoraMatch29
OR
fedoraprojectfedoraMatch30
OR
fedoraprojectfedoraMatch31
Node
opensuseleapMatch15.0
OR
opensuseleapMatch15.1
Node
redhatopenshift_container_platformMatch4.1
OR
redhatopenshift_container_platformMatch4.2
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linux_eusMatch8.1
OR
redhatenterprise_linux_eusMatch8.2
OR
redhatenterprise_linux_eusMatch8.4
OR
redhatenterprise_linux_server_ausMatch8.2
OR
redhatenterprise_linux_server_ausMatch8.4
OR
redhatenterprise_linux_server_tusMatch8.2
OR
redhatenterprise_linux_server_tusMatch8.4
Node
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch19.10

References

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.8%