Description
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
References (15)
Scores
CVSS v3
7.0
EPSS
0.0014
EPSS Percentile
33.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-706
Status
published
Products (10)
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
debian/debian_linux
9.0
debian/debian_linux
10.0
linuxfoundation/runc
1.0.0 rc1 (9 CPE variants)
linuxfoundation/runc
< 0.1.1
opencontainers/runc
0 - 1.0.0-rc9.0.20200122160610-2fc03cc11c77Go
opensuse/leap
15.1
redhat/openshift_container_platform
4.1
redhat/openshift_container_platform
4.2
Published
Feb 12, 2020
Tracked Since
Feb 18, 2026