runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "4.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "4.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "19.10"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "29"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "30"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "31"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "15.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "15.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "19.03.2"
},
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
]
}{
"extracted_events": [
{
"introduced": "0.0.1"
},
{
"last_affected": "0.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc1"
},
{
"last_affected": "1.0.0-rc2"
},
{
"last_affected": "1.0.0-rc3"
},
{
"last_affected": "1.0.0-rc4"
},
{
"last_affected": "1.0.0-rc5"
},
{
"last_affected": "1.0.0-rc6"
},
{
"last_affected": "1.0.0-rc7"
},
{
"last_affected": "1.0.0-rc8"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*"
]
}