runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Kubernetes Engine Subscribe
Fedoraproject Subscribe
Kubernetes Engine Subscribe
Onesphere Subscribe
Linuxcontainers Subscribe
Linuxfoundation Subscribe
Microfocus Subscribe
Service Management Automation Subscribe
Hci Management Node Subscribe
Solidfire Subscribe
Opensuse Subscribe
Backports Sle Subscribe
Container Development Kit Subscribe
Enterprise Linux Subscribe
Enterprise Linux Server Subscribe
Openshift Subscribe
Rhel Extras Other Subscribe
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-4048-1 Docker vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html cve-icon cve-icon
http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html cve-icon cve-icon
http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/03/23/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/06/28/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/10/24/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/10/29/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/31/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/01/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/02/3 cve-icon cve-icon
http://www.securityfocus.com/bid/106976 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0303 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0401 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0408 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0975 cve-icon cve-icon
https://access.redhat.com/security/cve/cve-2019-5736 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/runcescape cve-icon cve-icon
https://aws.amazon.com/security/security-bulletins/AWS-2019-002/ cve-icon cve-icon
https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/ cve-icon cve-icon
https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/ cve-icon cve-icon
https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html cve-icon cve-icon cve-icon
https://brauner.github.io/2019/02/12/privileged-containers.html cve-icon cve-icon
https://bugzilla.suse.com/show_bug.cgi?id=1121967 cve-icon cve-icon
https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc cve-icon cve-icon
https://github.com/Frichetten/CVE-2019-5736-PoC cve-icon cve-icon
https://github.com/docker/docker-ce/releases/tag/v18.09.2 cve-icon cve-icon
https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b cve-icon cve-icon
https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d cve-icon cve-icon
https://github.com/q3k/cve-2019-5736-poc cve-icon cve-icon
https://github.com/rancher/runc-cve cve-icon cve-icon
https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/ cve-icon cve-icon
https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-5736 cve-icon
https://seclists.org/oss-sec/2019/q1/119 cve-icon
https://security.gentoo.org/glsa/202003-21 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190307-0008/ cve-icon cve-icon
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us cve-icon cve-icon
https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc cve-icon cve-icon
https://usn.ubuntu.com/4048-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-5736 cve-icon
https://www.exploit-db.com/exploits/46359/ cve-icon cve-icon
https://www.exploit-db.com/exploits/46369/ cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2019/02/11/2 cve-icon cve-icon
https://www.synology.com/security/advisory/Synology_SA_19_06 cve-icon cve-icon
https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/ cve-icon cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.55532}

epss

{'score': 0.55263}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T20:01:52.208Z

Reserved: 2019-01-08T00:00:00

Link: CVE-2019-5736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-11T19:29:00.297

Modified: 2024-11-21T04:45:24.603

Link: CVE-2019-5736

cve-icon Redhat

Severity : Important

Publid Date: 2019-02-11T13:22:00Z

Links: CVE-2019-5736 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses