runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "0.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc5"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc6"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc7"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc8"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.0-rc9"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19921.json"