Closed mend-bolt-for-github[bot] closed 3 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
CVE-2019-5736 - High Severity Vulnerability
Vulnerable Library - github.com/opencontainers/runc-v0.1.1
CLI tool for spawning and running containers according to the OCI specification
Dependency Hierarchy: - github.com/hyperledger/fabric-v1.4.1 (Root Library) - github.com/fsouza/go-dockerclient-v1.6.5 - github.com/docker/docker-v17.03.2-ce - :x: **github.com/opencontainers/runc-v0.1.1** (Vulnerable Library)
Found in HEAD commit: d388e16464e00b9ce84df0d247029f534a429b90
Found in base branch: main
Vulnerability Details
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Publish Date: 2019-02-11
URL: CVE-2019-5736
CVSS 3 Score Details (8.6)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-5736
Release Date: 2019-02-11
Fix Resolution: v1.0.0-rc7
Step up your Open Source Security Game with WhiteSource here