First published: Thu Jan 10 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lxc | 1:4.0.6-2+deb11u2 1:5.0.2-1+deb12u3 1:6.0.3-1 | |
debian/runc | 1.0.0~rc93+ds1-5+deb11u5 1.0.0~rc93+ds1-5+deb11u3 1.1.5+ds1-1+deb12u1 1.1.15+ds1-1 | |
Python Docker | <18.09.2 | |
runc | <=0.1.1 | |
runc | =1.0.0-rc1 | |
runc | =1.0.0-rc2 | |
runc | =1.0.0-rc3 | |
runc | =1.0.0-rc4 | |
runc | =1.0.0-rc5 | |
runc | =1.0.0-rc6 | |
Red Hat Container Development Kit | =3.7 | |
Red Hat OpenShift | =3.4 | |
Red Hat OpenShift | =3.5 | |
Red Hat OpenShift | =3.6 | |
Red Hat OpenShift | =3.7 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Google Kubernetes Engine | ||
Linux Containers (LXC) | <3.2.0 | |
HP OneSphere | ||
NetApp SolidFire & HCI Management Node | ||
NetApp SolidFire & HCI Storage Node | ||
Apache Mesos | >=1.4.0<1.4.3 | |
Apache Mesos | >=1.6.0<1.6.2 | |
Apache Mesos | >=1.7.0<1.7.2 | |
openSUSE Backports | =15.0 | |
openSUSE Backports | =15.0-sp1 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =42.3 | |
D2iQ Kubernetes Engine | <2.2.0-1.13.3 | |
D2iQ DC/OS | <1.10.10 | |
D2iQ DC/OS | >=1.10.11<1.11.9 | |
D2iQ DC/OS | >=1.11.10<1.12.1 | |
Red Hat Fedora | =29 | |
Red Hat Fedora | =30 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
Micro Focus Service Management Automation | =2018.02 | |
Micro Focus Service Management Automation | =2018.05 | |
Micro Focus Service Management Automation | =2018.08 | |
Micro Focus Service Management Automation | =2018.11 |
https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-5736.
The affected software includes Docker before version 18.09.2, Linuxfoundation Runc before version 1.0.0-rc6, and other products.
An attacker can exploit this vulnerability by executing a command as root within one of the affected containers to overwrite the host runc binary and gain root access on the host.
The severity rating of this vulnerability is critical with a CVSS score of 8.6.
Yes, you can find more information about this vulnerability in the following references: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520029&action=diff), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520029&action=edit), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520030&action=diff).