First published: Thu Jan 10 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lxc | 1:4.0.6-2+deb11u2 1:5.0.2-1+deb12u3 1:6.0.3-1 | |
debian/runc | 1.0.0~rc93+ds1-5+deb11u5 1.0.0~rc93+ds1-5+deb11u3 1.1.5+ds1-1+deb12u1 1.1.15+ds1-1 | |
Docker | <18.09.2 | |
runc | <=0.1.1 | |
runc | =1.0.0-rc1 | |
runc | =1.0.0-rc2 | |
runc | =1.0.0-rc3 | |
runc | =1.0.0-rc4 | |
runc | =1.0.0-rc5 | |
runc | =1.0.0-rc6 | |
redhat container development kit | =3.7 | |
Red Hat OpenShift | =3.4 | |
Red Hat OpenShift | =3.5 | |
Red Hat OpenShift | =3.6 | |
Red Hat OpenShift | =3.7 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux server | =7.0 | |
Google Kubernetes Engine | ||
linuxcontainers lxc | <3.2.0 | |
hp onesphere | ||
netapp hci management node | ||
netapp solidfire | ||
Apache Mesos | >=1.4.0<1.4.3 | |
Apache Mesos | >=1.6.0<1.6.2 | |
Apache Mesos | >=1.7.0<1.7.2 | |
openSUSE Backports | =15.0 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 | |
d2iq kubernetes engine | <2.2.0-1.13.3 | |
d2iq dc\/os | <1.10.10 | |
d2iq dc\/os | >=1.10.11<1.11.9 | |
d2iq dc\/os | >=1.11.10<1.12.1 | |
Fedora | =29 | |
Fedora | =30 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
microfocus service management automation | =2018.02 | |
microfocus service management automation | =2018.05 | |
microfocus service management automation | =2018.08 | |
microfocus service management automation | =2018.11 |
https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-5736.
The affected software includes Docker before version 18.09.2, Linuxfoundation Runc before version 1.0.0-rc6, and other products.
An attacker can exploit this vulnerability by executing a command as root within one of the affected containers to overwrite the host runc binary and gain root access on the host.
The severity rating of this vulnerability is critical with a CVSS score of 8.6.
Yes, you can find more information about this vulnerability in the following references: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520029&action=diff), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520029&action=edit), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1520030&action=diff).