### [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. ### POC #### Reference - https://github.com/opencontainers/runc/issues/2128 #### Github - https://github.com/43622283/awesome-cloud-native-security - https://github.com/ARPSyndicate/cvemon - https://github.com/Metarget/awesome-cloud-native-security - https://github.com/Metarget/metarget - https://github.com/PRISHIta123/Securing_Open_Source_Components_on_Containers - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground - https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground - https://github.com/atesemre/awesome-cloud-native-security - https://github.com/fenixsecurelabs/core-nexus - https://github.com/h4ckm310n/Container-Vulnerability-Exploit - https://github.com/hacking-kubernetes/hacking-kubernetes.info - https://github.com/iridium-soda/container-escape-exploits - https://github.com/openSUSE/libpathrs - https://github.com/phoenixvlabs/core-nexus - https://github.com/phxvlabsio/core-nexus - https://github.com/sivahpe/trivy-test - https://github.com/source-xu/docker-vuls - https://github.com/ssst0n3/docker_archive