vulnerability

Oracle Linux: CVE-2019-5736: ELSA-2019-0975: container-tools:rhel8 security and bug fix update (IMPORTANT) (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
2019-02-11
Added
2019-02-12
Modified
2025-01-07

Description

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system.

Solution(s)

oracle-linux-upgrade-buildahoracle-linux-upgrade-containernetworking-pluginsoracle-linux-upgrade-containers-commonoracle-linux-upgrade-container-selinuxoracle-linux-upgrade-docker-engineoracle-linux-upgrade-fuse-overlayfsoracle-linux-upgrade-oci-systemd-hookoracle-linux-upgrade-oci-umountoracle-linux-upgrade-podmanoracle-linux-upgrade-podman-dockeroracle-linux-upgrade-runcoracle-linux-upgrade-skopeooracle-linux-upgrade-slirp4netns
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.