CVE-2019-19921

Source
https://cve.org/CVERecord?id=CVE-2019-19921
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19921.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-19921
Aliases
Downstream
Related
Published
2020-02-12T15:15:12.210Z
Modified
2026-02-24T11:32:10.842620Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)

References

Affected packages

Git / github.com/checkstyle/checkstyle

Affected ranges

Type
GIT
Repo
https://github.com/checkstyle/checkstyle
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other
bcel
release1_1
release1_2
release1_3
release1_4
release2_0
release2_2
release2_4
release3_0
release3_1
release3_2
release3_3
release3_4
release4_0
release4_0_beta_1
release4_0_beta_2
release4_0_beta_3
release4_0_beta_4
release4_0_beta_5
release4_1
v2-branch_lmp

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19921.json"