CVE-2019-19921
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/02/2020
Last modified:
07/11/2023
Description
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* | 0.1.1 (including) | |
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html
- https://access.redhat.com/errata/RHSA-2020:0688
- https://access.redhat.com/errata/RHSA-2020:0695
- https://github.com/opencontainers/runc/issues/2197
- https://github.com/opencontainers/runc/pull/2190
- https://github.com/opencontainers/runc/releases
- https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/
- https://security-tracker.debian.org/tracker/CVE-2019-19921
- https://security.gentoo.org/glsa/202003-21
- https://usn.ubuntu.com/4297-1/



