runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| docker | docker | 18.09.2 | - |
| linuxfoundation | runc | 0.1.1 | - |
| linuxfoundation | runc | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
43
Affected Products
132
References
docker / docker
| - |
| linuxfoundation | runc | - | - |
| linuxfoundation | runc | - | - |
| linuxfoundation | runc | - | - |
| linuxfoundation | runc | - | - |
| linuxfoundation | runc | - | - |
| redhat | container_development_kit | - | - |
| redhat | openshift | - | - |
| redhat | openshift | - | - |
| redhat | openshift | - | - |
| redhat | openshift | - | - |
| redhat | enterprise_linux | - | - |
| redhat | enterprise_linux_server | - | - |
| kubernetes_engine | - | - |
| linuxcontainers | lxc | 3.2.0 | - |
| hp | onesphere | - | - |
| netapp | hci_management_node | - | - |
| netapp | solidfire | - | - |
| apache | mesos | 1.4.0 - 1.4.3 | - |
| apache | mesos | 1.5.0 - 1.5.3 | - |
| apache | mesos | 1.6.0 - 1.6.2 | - |
| apache | mesos | 1.7.0 - 1.7.2 | - |
| opensuse | backports_sle | - | - |
| opensuse | backports_sle | - | - |
| opensuse | leap | - | - |
| opensuse | leap | - | - |
| opensuse | leap | - | - |
| d2iq | kubernetes_engine | 2.2.0-1.13.3 | - |
| d2iq | dc\/os | 1.10.10 | - |
| d2iq | dc\/os | 1.10.11 - 1.11.9 | - |
| d2iq | dc\/os | 1.11.10 - 1.12.1 | - |
| fedoraproject | fedora | - | - |
| fedoraproject | fedora | - | - |
| canonical | ubuntu_linux | - | - |
| canonical | ubuntu_linux | - | - |
| canonical | ubuntu_linux | - | - |
| canonical | ubuntu_linux | - | - |
| microfocus | service_management_automation | - | - |
| microfocus | service_management_automation | - | - |
| microfocus | service_management_automation | - | - |
| microfocus | service_management_automation | - | - |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Exploitability
Impact