Description
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Published: 2019-02-11
Score: 8.6 High
EPSS: 59.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-4048-1 Docker vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html cve-icon cve-icon
http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html cve-icon cve-icon
http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/03/23/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/06/28/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/10/24/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/10/29/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/31/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/01/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/02/3 cve-icon cve-icon
http://www.securityfocus.com/bid/106976 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0303 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0401 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0408 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0975 cve-icon cve-icon
https://access.redhat.com/security/cve/cve-2019-5736 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/runcescape cve-icon cve-icon
https://aws.amazon.com/security/security-bulletins/AWS-2019-002/ cve-icon cve-icon
https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/ cve-icon cve-icon
https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/ cve-icon cve-icon
https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html cve-icon cve-icon cve-icon
https://brauner.github.io/2019/02/12/privileged-containers.html cve-icon cve-icon
https://bugzilla.suse.com/show_bug.cgi?id=1121967 cve-icon cve-icon
https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc cve-icon cve-icon
https://github.com/Frichetten/CVE-2019-5736-PoC cve-icon cve-icon
https://github.com/docker/docker-ce/releases/tag/v18.09.2 cve-icon cve-icon
https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b cve-icon cve-icon
https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d cve-icon cve-icon
https://github.com/q3k/cve-2019-5736-poc cve-icon cve-icon
https://github.com/rancher/runc-cve cve-icon cve-icon
https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/ cve-icon cve-icon
https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-5736 cve-icon
https://seclists.org/oss-sec/2019/q1/119 cve-icon
https://security.gentoo.org/glsa/202003-21 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190307-0008/ cve-icon cve-icon
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us cve-icon cve-icon
https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc cve-icon cve-icon
https://usn.ubuntu.com/4048-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-5736 cve-icon
https://www.exploit-db.com/exploits/46359/ cve-icon cve-icon
https://www.exploit-db.com/exploits/46369/ cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2019/02/11/2 cve-icon cve-icon
https://www.synology.com/security/advisory/Synology_SA_19_06 cve-icon cve-icon
https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/ cve-icon cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.55532}

epss

{'score': 0.55263}


Subscriptions

Apache Mesos
Canonical Ubuntu Linux
D2iq Dc\/os Kubernetes Engine
Docker Docker
Fedoraproject Fedora
Google Kubernetes Engine
Hp Onesphere
Linuxcontainers Lxc
Linuxfoundation Runc
Microfocus Service Management Automation
Netapp Hci Management Node Solidfire
Opensuse Backports Sle Leap
Redhat Container Development Kit Enterprise Linux Enterprise Linux Server Openshift Rhel Extras Other
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T20:01:52.208Z

Reserved: 2019-01-08T00:00:00.000Z

Link: CVE-2019-5736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-11T19:29:00.297

Modified: 2024-11-21T04:45:24.603

Link: CVE-2019-5736

cve-icon Redhat

Severity : Important

Publid Date: 2019-02-11T13:22:00Z

Links: CVE-2019-5736 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses