runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 06 Dec 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:linuxfoundation:runc:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:* |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-06T13:09:23.914Z
Reserved: 2023-03-03T00:00:00
Link: CVE-2023-27561

Updated: 2024-12-06T13:09:23.914Z

Status : Modified
Published: 2023-03-03T19:15:11.330
Modified: 2024-12-06T14:15:19.037
Link: CVE-2023-27561
