Release Date: | 2019-02-11 |
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
See more information about CVE-2019-5736 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 8.6 | Base Metrics: | AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Access Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | None | User Interaction: | Required |
Scope: | Changed | Confidentiality Impact: | High |
Integrity Impact: | High | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 7 (docker-engine) | ELSA-2019-4550 | 2019-02-15 |
Oracle Linux version 7 (docker-engine) | ELSA-2019-4551 | 2019-02-19 |
Oracle Linux version 7 (runc) | ELSA-2019-4540 | 2019-02-11 |
Oracle Linux version 7 (runc) | ELSA-2021-9203 | 2021-04-28 |
Oracle Linux version 8 (buildah) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (container-selinux) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (containernetworking-plugins) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (fuse-overlayfs) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (oci-systemd-hook) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (oci-umount) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (podman) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (runc) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (skopeo) | ELSA-2019-0975 | 2019-07-30 |
Oracle Linux version 8 (slirp4netns) | ELSA-2019-0975 | 2019-07-30 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team