CVE-2019-16884

Priority
Description
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other
products, allows AppArmor restriction bypass because
libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a
malicious Docker image can mount over a /proc directory.
Ubuntu-Description
It was discovered that runC incorrectly implemented AppArmor restrictions. An
attacker could possibly use this issue to mount malicious images.
Notes
Package
Source: runc (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):released (1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
Ubuntu 20.04 (Focal Fossa):released (1.0.0~rc8+git20190923.3e425f80-0ubuntu1)
More Information

Updated: 2020-01-29 18:59:05 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)