CVE-2019-16884

NameCVE-2019-16884
Descriptionrunc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs942026, 942027

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-opencontainers-selinux (PTS)buster1.0.0~rc1+git20170621.5.4a2974b-1vulnerable
bullseye, sid1.3.0-2vulnerable
runc (PTS)stretch0.1.1+dfsg1-2+deb9u1vulnerable
buster1.0.0~rc6+dfsg1-3vulnerable
bullseye, sid1.0.0~rc9+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-opencontainers-selinuxsource(unstable)(unfixed)942027
runcsource(unstable)1.0.0~rc9+dfsg1-1942026

Notes

https://github.com/opencontainers/runc/issues/2128

Search for package or bug name: Reporting problems