Amazon Linux 1 (EOL) Security Advisory: ALAS-2021-1556
Advisory Released Date: 2022-01-20
Advisory Updated Date: 2025-04-23
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. (CVE-2019-16884)
A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2019-19921)
Affected Packages:
runc
Issue Correction:
Run yum update runc to update your system.
src:
runc-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.src
x86_64:
runc-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64
runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.1.amzn1.x86_64
2025-04-23: CVE-2019-19921 was added to this advisory.