You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
mend-for-github-combot
changed the title
CVE-2023-27561 (Medium) detected in github.com/opencontainers/runc-v0.1.1
CVE-2023-27561 (High) detected in github.com/opencontainers/runc-v0.1.1
Mar 31, 2023
CVE-2023-27561 - High Severity Vulnerability
Vulnerable Library - github.com/opencontainers/runc-v0.1.1
CLI tool for spawning and running containers according to the OCI specification
Library home page: https://proxy.golang.org/github.com/opencontainers/runc/@v/v0.1.1.zip
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Publish Date: 2023-03-03
URL: CVE-2023-27561
CVSS 3 Score Details (7.0)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: