CVE-2019-19921

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
linuxfoundationrunc
𝑥
≤ 0.1.1
linuxfoundationrunc
1.0.0:rc1
linuxfoundationrunc
1.0.0:rc2
linuxfoundationrunc
1.0.0:rc3
linuxfoundationrunc
1.0.0:rc4
linuxfoundationrunc
1.0.0:rc5
linuxfoundationrunc
1.0.0:rc6
linuxfoundationrunc
1.0.0:rc7
linuxfoundationrunc
1.0.0:rc8
linuxfoundationrunc
1.0.0:rc9
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.10
redhatopenshift_container_platform
4.1
redhatopenshift_container_platform
4.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
runc
bullseye
1.0.0~rc93+ds1-5+deb11u5
fixed
stretch
no-dsa
bullseye (security)
1.0.0~rc93+ds1-5+deb11u3
fixed
bookworm
1.1.5+ds1-1+deb12u1
fixed
bookworm (security)
1.1.5+ds1-1+deb12u1
fixed
trixie
1.1.12+ds1-5.1
fixed
sid
1.1.15+ds1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
runc
lunar
Fixed 1.0.0~rc10-0ubuntu1
released
kinetic
Fixed 1.0.0~rc10-0ubuntu1
released
jammy
Fixed 1.0.0~rc10-0ubuntu1
released
impish
Fixed 1.0.0~rc10-0ubuntu1
released
hirsute
Fixed 1.0.0~rc10-0ubuntu1
released
groovy
Fixed 1.0.0~rc10-0ubuntu1
released
focal
Fixed 1.0.0~rc10-0ubuntu1
released
eoan
Fixed 1.0.0~rc10-0ubuntu1~19.10.2
released
disco
ignored
bionic
Fixed 1.0.0~rc10-0ubuntu1~18.04.2
released
xenial
Fixed 1.0.0~rc7+git20190403.029124da-0ubuntu1~16.04.4+esm4
released
trusty
dne
References