runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Mesos
Subscribe
|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
D2iq
Subscribe
|
|
|
Docker
Subscribe
|
Docker
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Google
Subscribe
|
Kubernetes Engine
Subscribe
|
|
Hp
Subscribe
|
Onesphere
Subscribe
|
|
Linuxcontainers
Subscribe
|
Lxc
Subscribe
|
|
Linuxfoundation
Subscribe
|
Runc
Subscribe
|
|
Microfocus
Subscribe
|
Service Management Automation
Subscribe
|
|
Netapp
Subscribe
|
|
|
Opensuse
Subscribe
|
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4048-1 | Docker vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:01:52.208Z
Reserved: 2019-01-08T00:00:00
Link: CVE-2019-5736
No data.
Status : Modified
Published: 2019-02-11T19:29:00.297
Modified: 2024-11-21T04:45:24.603
Link: CVE-2019-5736
OpenCVE Enrichment
No data.
Ubuntu USN