runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Runc | Linuxfoundation | * | 0.1.1 (including) |
Runc | Linuxfoundation | 1.0.0-rc1 (including) | 1.0.0-rc1 (including) |
Runc | Linuxfoundation | 1.0.0-rc2 (including) | 1.0.0-rc2 (including) |
Runc | Linuxfoundation | 1.0.0-rc3 (including) | 1.0.0-rc3 (including) |
Runc | Linuxfoundation | 1.0.0-rc4 (including) | 1.0.0-rc4 (including) |
Runc | Linuxfoundation | 1.0.0-rc5 (including) | 1.0.0-rc5 (including) |
Runc | Linuxfoundation | 1.0.0-rc6 (including) | 1.0.0-rc6 (including) |
Runc | Linuxfoundation | 1.0.0-rc7 (including) | 1.0.0-rc7 (including) |
Runc | Linuxfoundation | 1.0.0-rc8 (including) | 1.0.0-rc8 (including) |
Runc | Linuxfoundation | 1.0.0-rc9 (including) | 1.0.0-rc9 (including) |