Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-5736

Опубликовано: 11 фев. 2019
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 9.3
CVSS3: 8.6

Описание

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

РелизСтатусПримечание
bionic

released

18.06.1-0ubuntu1.2~18.04.1
cosmic

released

18.06.1-0ubuntu1.2
devel

not-affected

18.09.5-0ubuntu1
disco

not-affected

18.09.5-0ubuntu1
esm-apps/bionic

released

18.06.1-0ubuntu1.2~18.04.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
esm-infra/xenial

released

18.06.1-0ubuntu1.2~16.04.1
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needed

Показывать по

РелизСтатусПримечание
bionic

released

1.0.0~rc4+dfsg1-6ubuntu0.18.04.1
cosmic

released

1.0.0~rc4+dfsg1-6ubuntu0.18.10.1
devel

not-affected

1.0.0~rc7+git20190403.029124da-0ubuntu1
disco

not-affected

1.0.0~rc7+git20190403.029124da-0ubuntu1
esm-apps/bionic

released

1.0.0~rc4+dfsg1-6ubuntu0.18.04.1
esm-apps/xenial

released

1.0.0~rc2+docker1.13.1-0ubuntu1~16.04.1
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

EPSS

Процентиль: 98%
0.52476
Средний

9.3 Critical

CVSS2

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
redhat
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVSS3: 8.6
nvd
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

CVSS3: 8.6
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 8.6
debian
больше 6 лет назад

runc through 1.0-rc6, as used in Docker before 18.09.2 and other produ ...

suse-cvrf
больше 5 лет назад

Security update for lxc

EPSS

Процентиль: 98%
0.52476
Средний

9.3 Critical

CVSS2

8.6 High

CVSS3