Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-5736

Опубликовано: 11 фев. 2019
Источник: redhat
CVSS3: 7.7

Описание

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system.

Отчет

The 'docker' package shipped in Red Hat Enterprise Linux 7 Extras bundles 'runc' since 'docker' starting from version 1.12. Both the 'docker' and 'runc' packages are affected by this issue. The 'docker-latest' package is deprecated as of Red Hat Enterprise Linux 7.5. Customers using this package should update to the latest 'docker' package shipped in Red Hat Enterprise Linux 7 Extras. OpenShift Container Platform (OCP) versions 3.9 and later use 'docker' version 1.13 in the default configuration but can be configured to use CRI-O as an alternative, which depends on the 'runc' package. OCP versions 3.9 and later should use the updated 'docker' and 'runc' packages shipped in Red Hat Enterprise Linux 7 Extras. OCP versions 3.4 through 3.7 originally used 'docker' version 1.12 from the Red Hat Enterprise Linux 7 Extras channel. An updated version of 'docker' 1.12 has been delivered to the RPM channels for OCP versions 3.4 through 3.7. OCP version 3.9 previously shipped a version of 'runc' in it's RPM repository. OCP 3.9 clusters using CRI-O should update 'runc' from the Red Hat Enterprise Linux 7 Extras channel. Red Hat Enterprise Linux Atomic Host 7 is not affected by this vulnerability as the target runc binaries are stored on a read-only filesystem and cannot be overwritten.

Меры по смягчению последствий

This vulnerability is mitigated on Red Hat Enterprise Linux 7 if SELinux is in enforcing mode. SELinux in enforcing mode is a pre-requisite for OpenShift Container Platform 3.x.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7docker-latestWill not fix
Red Hat Enterprise Linux 8container-tools:1.0/runcNot affected
Red Hat Enterprise Linux Atomic Host 7dockerNot affected
Red Hat Enterprise Linux Atomic Host 7runcNot affected
Red Hat OpenShift Container Platform 3.9runcWill not fix
Red Hat OpenShift Container Platform 4runcNot affected
OtherFixedRHSA-2019:040125.02.2019
Red Hat Enterprise Linux 7 ExtrasruncFixedRHSA-2019:030311.02.2019
Red Hat Enterprise Linux 7 ExtrasdockerFixedRHSA-2019:030411.02.2019
Red Hat Enterprise Linux 8container-toolsFixedRHSA-2019:097507.05.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-672
https://bugzilla.redhat.com/show_bug.cgi?id=1664908runc: Execution of malicious containers allows for container escape and access to host filesystem

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVSS3: 8.6
nvd
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVSS3: 8.6
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 8.6
debian
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other produ ...

suse-cvrf
больше 5 лет назад

Security update for lxc

7.7 High

CVSS3