runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/opencontainers/runc(Go) | 0 | 1.0.0-rc8.0.20190930145003-cad42f6e0932 | N/A |
| github.com/opencontainers/selinux(Go) | 0 | 1.3.1-0.20190929122143-5215b1806f52 | N/A |
CVSS Metrics