Upstream information

CVE-2019-16884 at MITRE

Description

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

SUSE information

Overall state of this security issue: Running

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  SUSE
Base Score 5.3
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Access Vector Local
Access Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact Low
Integrity Impact Low
Availability Impact Low
CVSSv3 Version 3
SUSE Bugzilla entry: 1152308 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE CaaS Platform 3.0
  • containerd-kubic >= 1.2.10-16.26.1
  • docker-kubic >= 19.03.5_ce-98.51.1
  • docker-libnetwork-kubic >= 0.7.0.1+gitr2877_3eb39382bfa6-28.1
  • docker-runc-kubic >= 1.0.0rc8+gitr3917_3e425f80a8c9-1.35.1
  • golang-github-docker-libnetwork-kubic >= 0.7.0.1+gitr2877_3eb39382bfa6-28.1
Patchnames:
SUSE-CAASP-3.0-2019-2787
SUSE-CAASP-3.0-2020-65
SUSE Linux Enterprise Module for Containers 12
  • containerd >= 1.2.10-16.26.1
  • docker >= 19.03.5_ce-98.51.1
  • docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-28.1
  • docker-runc >= 1.0.0rc8+gitr3917_3e425f80a8c9-1.35.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-28.1
Patchnames:
SUSE-SLE-Module-Containers-12-2019-2787
SUSE-SLE-Module-Containers-12-2020-65
SUSE Linux Enterprise Module for Containers 15
  • containerd >= 1.2.10-5.19.1
  • docker >= 19.03.5_ce-6.31.1
  • docker-bash-completion >= 19.03.5_ce-6.31.1
  • docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • docker-runc >= 1.0.0rc8+gitr3917_3e425f80a8c9-6.27.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
Patchnames:
SUSE-SLE-Module-Containers-15-2019-2786
SUSE-SLE-Module-Containers-15-2020-35
SUSE Linux Enterprise Module for Containers 15 SP1
  • containerd >= 1.2.10-5.19.1
  • docker >= 19.03.5_ce-6.31.1
  • docker-bash-completion >= 19.03.5_ce-6.31.1
  • docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • docker-runc >= 1.0.0rc8+gitr3917_3e425f80a8c9-6.27.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • runc >= 1.0.0~rc8-1.6.1
Patchnames:
SUSE-SLE-Module-Containers-15-SP1-2019-2786
SUSE-SLE-Module-Containers-15-SP1-2019-2810
SUSE-SLE-Module-Containers-15-SP1-2020-35
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
  • containerd >= 1.2.10-5.19.1
  • containerd-ctr >= 1.2.10-5.19.1
  • docker >= 19.03.5_ce-6.31.1
  • docker-test >= 19.03.5_ce-6.31.1
  • docker-zsh-completion >= 19.03.5_ce-6.31.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-2020-35
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1
  • containerd >= 1.2.10-5.19.1
  • containerd-ctr >= 1.2.10-5.19.1
  • containerd-kubic >= 1.2.10-5.19.1
  • containerd-kubic-ctr >= 1.2.10-5.19.1
  • docker >= 19.03.5_ce-6.31.1
  • docker-kubic >= 19.03.5_ce-6.31.1
  • docker-kubic-bash-completion >= 19.03.5_ce-6.31.1
  • docker-kubic-kubeadm-criconfig >= 19.03.5_ce-6.31.1
  • docker-kubic-test >= 19.03.5_ce-6.31.1
  • docker-kubic-zsh-completion >= 19.03.5_ce-6.31.1
  • docker-libnetwork-kubic >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • docker-runc-kubic >= 1.0.0rc8+gitr3917_3e425f80a8c9-6.27.1
  • docker-test >= 19.03.5_ce-6.31.1
  • docker-zsh-completion >= 19.03.5_ce-6.31.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • golang-github-docker-libnetwork-kubic >= 0.7.0.1+gitr2877_3eb39382bfa6-4.18.1
  • runc >= 1.0.0~rc8-1.6.1
  • runc-test >= 1.0.0~rc8-1.6.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2786
SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2810
SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-35
openSUSE Leap 15.0
  • docker-runc >= 1.0.0rc8+gitr3826_425e105d5a03-lp150.5.28.1
  • docker-runc-debuginfo >= 1.0.0rc8+gitr3826_425e105d5a03-lp150.5.28.1
Patchnames:
openSUSE-2019-2418
openSUSE Leap 15.1
  • containerd >= 1.2.10-lp151.2.9.1
  • containerd-ctr >= 1.2.10-lp151.2.9.1
  • docker >= 19.03.5_ce-lp151.2.15.1
  • docker-bash-completion >= 19.03.5_ce-lp151.2.15.1
  • docker-debuginfo >= 19.03.5_ce-lp151.2.15.1
  • docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
  • docker-libnetwork-debuginfo >= 0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
  • docker-runc >= 1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1
  • docker-runc-debuginfo >= 1.0.0rc8+gitr3917_3e425f80a8c9-lp151.3.12.1
  • docker-test >= 19.03.5_ce-lp151.2.15.1
  • docker-test-debuginfo >= 19.03.5_ce-lp151.2.15.1
  • docker-zsh-completion >= 19.03.5_ce-lp151.2.15.1
  • golang-github-docker-libnetwork >= 0.7.0.1+gitr2877_3eb39382bfa6-lp151.2.9.1
Patchnames:
openSUSE-2019-2434
openSUSE-2020-45


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
CaaS Platform 1.0 runc Affected
CaaS Platform 2.0 runc Affected
OpenStack Cloud Magnum Orchestration 7.0 runc Affected
SUSE Linux Enterprise Module for Containers 12 runc Affected
SUSE Linux Enterprise Module for Containers 15 runc Released
SUSE Openstack Cloud 6 runc Affected