CVE-2019-5736 log
| Source |
|
| Severity | High |
| Remote | Yes |
| Type | Privilege escalation |
| Description | A vulnerability discovered in runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-895 | podman-docker | 1.0.0-2 | High | Not affected | ||
| AVG-893 | lxc | 1:3.1.0-1 | High | Not affected | ||
| AVG-892 | docker | 1:18.09.1-2 | 1:18.09.2-1 | High | Not affected | |
| AVG-880 | flatpak | 1.2.2-1 | 1.2.3-1 | High | Fixed | |
| AVG-878 | runc | 1.0.0rc5+168+g079817cc-1 | 1.0.0rc6-1 | High | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 11 Feb 2019 | ASA-201902-6 | AVG-878 | runc | High | privilege escalation |
| 17 Feb 2019 | ASA-201902-20 | AVG-880 | flatpak | High | privilege escalation |