2024-05-26 14:27:05 +02:00
### [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884)



### Description
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
### POC
#### Reference
- https://github.com/opencontainers/runc/issues/2128
#### Github
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Metarget/metarget
- https://github.com/PRISHIta123/Securing_Open_Source_Components_on_Containers
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/fenixsecurelabs/core-nexus
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/iridium-soda/container-escape-exploits
2024-08-05 18:41:32 +00:00
- https://github.com/openSUSE/libpathrs
2024-05-26 14:27:05 +02:00
- https://github.com/phoenixvlabs/core-nexus
- https://github.com/phxvlabsio/core-nexus
- https://github.com/sivahpe/trivy-test
- https://github.com/source-xu/docker-vuls
- https://github.com/ssst0n3/docker_archive