CVE-2019-5736

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
dockerdocker
𝑥
< 18.09.2
linuxfoundationrunc
𝑥
≤ 0.1.1
linuxfoundationrunc
1.0.0:rc1
linuxfoundationrunc
1.0.0:rc2
linuxfoundationrunc
1.0.0:rc3
linuxfoundationrunc
1.0.0:rc4
linuxfoundationrunc
1.0.0:rc5
linuxfoundationrunc
1.0.0:rc6
redhatcontainer_development_kit
3.7
redhatopenshift
3.4
redhatopenshift
3.5
redhatopenshift
3.6
redhatopenshift
3.7
redhatenterprise_linux
8.0
redhatenterprise_linux_server
7.0
googlekubernetes_engine
-
linuxcontainerslxc
𝑥
< 3.2.0
hponesphere
-
netapphci_management_node
-
netappsolidfire
-
apachemesos
1.4.0 ≤
𝑥
< 1.4.3
apachemesos
1.5.0 ≤
𝑥
< 1.5.3
apachemesos
1.6.0 ≤
𝑥
< 1.6.2
apachemesos
1.7.0 ≤
𝑥
< 1.7.2
opensusebackports_sle
15.0
opensusebackports_sle
15.0:sp1
opensuseleap
15.0
opensuseleap
15.1
opensuseleap
42.3
d2iqkubernetes_engine
𝑥
< 2.2.0-1.13.3
d2iqdc\/os
𝑥
< 1.10.10
d2iqdc\/os
1.10.11 ≤
𝑥
< 1.11.9
d2iqdc\/os
1.11.10 ≤
𝑥
< 1.12.1
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
canonicalubuntu_linux
19.04
microfocusservice_management_automation
2018.02
microfocusservice_management_automation
2018.05
microfocusservice_management_automation
2018.08
microfocusservice_management_automation
2018.11
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lxc
bullseye
1:4.0.6-2+deb11u2
fixed
bookworm
1:5.0.2-1+deb12u2
fixed
sid
1:6.0.2-1
fixed
trixie
1:6.0.2-1
fixed
runc
bullseye
1.0.0~rc93+ds1-5+deb11u5
fixed
bullseye (security)
1.0.0~rc93+ds1-5+deb11u3
fixed
bookworm
1.1.5+ds1-1+deb12u1
fixed
bookworm (security)
1.1.5+ds1-1+deb12u1
fixed
trixie
1.1.12+ds1-5.1
fixed
sid
1.1.15+ds1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
docker.io
disco
not-affected
cosmic
Fixed 18.06.1-0ubuntu1.2
released
bionic
Fixed 18.06.1-0ubuntu1.2~18.04.1
released
xenial
Fixed 18.06.1-0ubuntu1.2~16.04.1
released
trusty
dne
runc
disco
not-affected
cosmic
Fixed 1.0.0~rc4+dfsg1-6ubuntu0.18.10.1
released
bionic
Fixed 1.0.0~rc4+dfsg1-6ubuntu0.18.04.1
released
xenial
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1~16.04.1
released
trusty
dne
References