EulerOS 2.0 SP9 : docker-runc (EulerOS-SA-2023-2611)

high Nessus Plugin ID 179555


The remote EulerOS host is missing multiple security updates.


According to the versions of the docker-runc package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.) (CVE-2019-19921)

- runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image. (CVE-2023-28642)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected docker-runc packages.

See Also

Plugin Details

Severity: High

ID: 179555

File Name: EulerOS_SA-2023-2611.nasl

Version: 1.0

Type: local

Published: 8/8/2023

Updated: 8/8/2023

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Medium

Base Score: 4.4

Temporal Score: 3.3

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-19921


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2023-28642

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:docker-runc-1.0.0.rc3, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/8/2023

Vulnerability Publication Date: 1/28/2020

Reference Information

CVE: CVE-2019-19921, CVE-2023-28642