[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2DOCKER-2021-009 --- runc

ID: oval:org.secpod.oval:def:1700742Date: (C)2021-12-10   (M)2024-02-19
Class: PATCHFamily: unix




runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability

Platform:
Amazon Linux 2
Product:
runc
Reference:
ALAS2DOCKER-2021-009
CVE-2019-16884
CVE-2019-19921
CVE    2
CVE-2019-19921
CVE-2019-16884
CPE    2
cpe:/a:runc:runc
cpe:/o:amazon:linux:2

© SecPod Technologies