Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 709456 (CVE-2019-19921) - <app-emulation/runc-1.0.0_rc10: Incorrect Access Control leading to Escalation of Privileges (CVE-2019-19921)
Summary: <app-emulation/runc-1.0.0_rc10: Incorrect Access Control leading to Escalatio...
Status: RESOLVED FIXED
Alias: CVE-2019-19921
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major
Assignee: Gentoo Security
URL: https://cve.mitre.org/cgi-bin/cvename...
Whiteboard: B1 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-02-13 09:19 UTC by filip ambroz
Modified: 2023-03-26 01:19 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description filip ambroz 2020-02-13 09:19:17 UTC
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images.


Fixed in 1.0.0-rc10:
https://github.com/opencontainers/runc/releases

References:
https://nvd.nist.gov/vuln/detail/CVE-2019-19921
https://security-tracker.debian.org/tracker/CVE-2019-19921
https://www.suse.com/security/cve/CVE-2019-19921/
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19921.html
Comment 1 Larry the Git Cow gentoo-dev 2020-03-14 22:49:57 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=597d7bc5fd67c1bece5dcf1f1f09a9e88bd3bc50

commit 597d7bc5fd67c1bece5dcf1f1f09a9e88bd3bc50
Author:     William Hubbs <williamh@gentoo.org>
AuthorDate: 2020-03-14 22:40:03 +0000
Commit:     William Hubbs <williamh@gentoo.org>
CommitDate: 2020-03-14 22:48:57 +0000

    app-emulation/runc: stable 1.0.0_rc10 on amd64
    
    Bug: https://bugs.gentoo.org/709456
    Signed-off-by: William Hubbs <williamh@gentoo.org>

 app-emulation/runc/runc-1.0.0_rc10.ebuild | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Comment 2 Larry the Git Cow gentoo-dev 2020-03-14 22:53:22 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2f21e4f1e09cb1c957781841a6ff90dae3494025

commit 2f21e4f1e09cb1c957781841a6ff90dae3494025
Author:     William Hubbs <williamh@gentoo.org>
AuthorDate: 2020-03-14 22:51:41 +0000
Commit:     William Hubbs <williamh@gentoo.org>
CommitDate: 2020-03-14 22:51:41 +0000

    app-emulation/runc: remove vulnerable versions
    
    Bug: https://bugs.gentoo.org/709456
    Bug: https://bugs.gentoo.org/711182
    
    Signed-off-by: William Hubbs <williamh@gentoo.org>

 app-emulation/runc/runc-1.0.0_rc8.ebuild | 63 --------------------------------
 app-emulation/runc/runc-1.0.0_rc9.ebuild | 63 --------------------------------
 2 files changed, 126 deletions(-)
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2020-03-15 04:16:45 UTC
Added to an existing GLSA.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2020-03-15 04:28:35 UTC
This issue was resolved and addressed in
 GLSA 202003-21 at https://security.gentoo.org/glsa/202003-21
by GLSA coordinator Thomas Deutschmann (whissi).