CVE-2019-5736 (NVD)

2019-02-11

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Products Mesos, Ubuntu_linux, Dc\/os, Kubernetes_engine, Docker, Fedora, Kubernetes_engine, Onesphere, Lxc, Runc, Service_management_automation, Hci_management_node, Solidfire, Backports_sle, Leap, Container_development_kit, Enterprise_linux, Enterprise_linux_server, Openshift
Type Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
First patch https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
Patches https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
Relevant file/s • ./libcontainer/nsenter/cloned_binary.c (added, +268)
• ./libcontainer/nsenter/nsexec.c (modified, +11)
Links https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
https://access.redhat.com/errata/RHSA-2019:0975
http://www.openwall.com/lists/oss-security/2019/03/23/1
https://www.openwall.com/lists/oss-security/2019/02/11/2
https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/

runc - Tree: 0a8e4117e7

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: