CVE-2019-5736 log
Source |
|
Severity | High |
Remote | Yes |
Type | Privilege escalation |
Description | A vulnerability discovered in runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-895 | podman-docker | 1.0.0-2 | High | Not affected | ||
AVG-893 | lxc | 1:3.1.0-1 | High | Not affected | ||
AVG-892 | docker | 1:18.09.1-2 | 1:18.09.2-1 | High | Not affected | |
AVG-880 | flatpak | 1.2.2-1 | 1.2.3-1 | High | Fixed | |
AVG-878 | runc | 1.0.0rc5+168+g079817cc-1 | 1.0.0rc6-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
11 Feb 2019 | ASA-201902-6 | AVG-878 | runc | High | privilege escalation |
17 Feb 2019 | ASA-201902-20 | AVG-880 | flatpak | High | privilege escalation |