Description
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4048-1 | Docker vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apache
Subscribe
Mesos
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
D2iq
Subscribe
Dc\/os
Subscribe
Kubernetes Engine
Subscribe
Docker
Subscribe
Docker
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Google
Subscribe
Kubernetes Engine
Subscribe
Hp
Subscribe
Onesphere
Subscribe
Linuxcontainers
Subscribe
Lxc
Subscribe
Linuxfoundation
Subscribe
Runc
Subscribe
Microfocus
Subscribe
Service Management Automation
Subscribe
Netapp
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Opensuse
Subscribe
Backports Sle
Subscribe
Leap
Subscribe
Redhat
Subscribe
Container Development Kit
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Server
Subscribe
Openshift
Subscribe
Rhel Extras Other
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:01:52.208Z
Reserved: 2019-01-08T00:00:00.000Z
Link: CVE-2019-5736
No data.
Status : Modified
Published: 2019-02-11T19:29:00.297
Modified: 2024-11-21T04:45:24.603
Link: CVE-2019-5736
OpenCVE Enrichment
No data.
Ubuntu USN