mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
1.8 KiB
1.8 KiB
CVE-2019-16884
Description
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
POC
Reference
Github
- https://github.com/43622283/awesome-cloud-native-security
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LouisLiuNova/container-escape-exploits
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Metarget/metarget
- https://github.com/PRISHIta123/Securing_Open_Source_Components_on_Containers
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
- https://github.com/atesemre/awesome-cloud-native-security
- https://github.com/cyphar/libpathrs
- https://github.com/fenixsecurelabs/core-nexus
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
- https://github.com/iridium-soda/container-escape-exploits
- https://github.com/neargle/re0-kubernetes-sec-archive
- https://github.com/openSUSE/libpathrs
- https://github.com/phoenixvlabs/core-nexus
- https://github.com/phxvlabsio/core-nexus
- https://github.com/sivahpe/trivy-test
- https://github.com/source-xu/docker-vuls
- https://github.com/sourcexu7/docker-vuls
- https://github.com/ssst0n3/docker_archive