runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "1.4.0"
},
{
"fixed": "1.4.3"
},
{
"introduced": "1.5.0"
},
{
"fixed": "1.5.3"
},
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.2"
},
{
"introduced": "1.7.0"
},
{
"fixed": "1.7.2"
}
]
},
{
"cpe": "cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "2.2.0-1.13.3"
}
]
},
{
"cpe": "cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "18.09.2"
}
]
},
{
"cpe": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "3.2.0"
}
]
},
{
"cpe": "cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2018.02"
}
]
},
{
"cpe": "cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2018.05"
}
]
},
{
"cpe": "cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2018.08"
}
]
},
{
"cpe": "cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "2018.11"
}
]
},
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0-NA"
}
]
},
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0-sp1"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "3.4"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "3.5"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "16.04"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.04"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.10"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "19.04"
}
]
},
{
"cpe": "cpe:2.3:o:d2iq:dc\\/os:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "1.10.10"
},
{
"introduced": "1.10.11"
},
{
"fixed": "1.11.9"
},
{
"introduced": "1.11.10"
},
{
"fixed": "1.12.1"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "29"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "30"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.1"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "42.3"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
}
]
}{
"cpe": [
"cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "0.1.1"
},
{
"last_affected": "1.0.0-rc1"
},
{
"last_affected": "1.0.0-rc2"
},
{
"last_affected": "1.0.0-rc3"
},
{
"last_affected": "1.0.0-rc4"
},
{
"last_affected": "1.0.0-rc5"
},
{
"last_affected": "1.0.0-rc6"
}
]
}{
"cpe": [
"cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.7"
},
{
"last_affected": "3.6"
}
]
}