TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVE-2019-5736: runc container breakout

240 pointsby afshinmehover 6 years ago

17 comments

NathanKPover 6 years ago
Amazon employee here: we have released a security bulletin covering how to update to the latest patched Docker on Amazon Linux, Amazon ECS, Amazon EKS, AWS Fargate, AWS IoT Greengrass, AWS Batch, AWS Elastic Beanstalk, AWS Cloud9, AWS SageMaker, AWS RoboMaker, and AWS Deep Learning AMI.<p>Please check out the bulletin and update if you are using one of these services.<p><a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;security-bulletins&#x2F;AWS-2019-002&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;security-bulletins&#x2F;AWS-2019-...</a>
评论 #19140973 未加载
sethvargoover 6 years ago
Hey all - Seth from Google here. Please let us know if you have any questions regarding GKE or questions about the upgrade process. I&#x27;m also happy to escalate any feedback to our internal product and engineering teams.<p>Here&#x27;s link to our security posting with more information and upgrade procedures: <a href="https:&#x2F;&#x2F;cloud.google.com&#x2F;kubernetes-engine&#x2F;docs&#x2F;security-bulletins#february-11-2019-runc" rel="nofollow">https:&#x2F;&#x2F;cloud.google.com&#x2F;kubernetes-engine&#x2F;docs&#x2F;security-bul...</a>
评论 #19136974 未加载
评论 #19138015 未加载
wicketover 6 years ago
&gt; However, it <i>is</i> blocked through correct use of user namespaces (where the host root is not mapped into the container&#x27;s user namespace).<p>In other words, this won&#x27;t affect anyone who understands the implications of running a process as root. Unfortunately, the sad truth is that most people I&#x27;ve come across who have &quot;lots of experience&quot; with implementing Docker containers, do not even understand the basics of how they work, let alone the implications of root access. I&#x27;ve interviewed candidates who claim to know Docker but can&#x27;t even tell me how Docker differs from traditional virtualisation or how it achieves its isolation. The best explanation that most of them come up with is, &quot;Docker containers are more lightweight&quot;.<p>This sort of vulnerability should have been a non-issue but it has gained attention due to the sheer amount of incorrectly configured containers in the wild. This was an accident waiting to happen, and I doubt we&#x27;ve heard the last of this sort of thing.
评论 #19138774 未加载
评论 #19138572 未加载
评论 #19138452 未加载
评论 #19140372 未加载
gr2020over 6 years ago
Looks like Docker 18.09.2 was released a few minutes ago to address this: <a href="https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker-ce&#x2F;releases" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker-ce&#x2F;releases</a>
评论 #19143360 未加载
CaliforniaKarlover 6 years ago
Red Hat’s page on the vulnerability: <a href="https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;runcescape" rel="nofollow">https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;runcescap...</a><p>RH CVE page, with the vulnerability’s metrics and the list of RH packages affected (plus links to the errata pages that have details on fixed builds): <a href="https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;cve&#x2F;cve-2019-5736" rel="nofollow">https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;cve&#x2F;cve-2019-5736</a>
achilleanover 6 years ago
There are nearly 4,000 exposed Docker daemons: <a href="https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;ol761bRb" rel="nofollow">https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;ol761bRb</a>
评论 #19136733 未加载
评论 #19136880 未加载
miguelmotaover 6 years ago
For better isolation check out KataContainers: <a href="https:&#x2F;&#x2F;github.com&#x2F;kata-containers&#x2F;runtime" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kata-containers&#x2F;runtime</a><p>It&#x27;s a drop-in replacement for runc. With KataContainers it runs docker containers in a lightweight VM so you get all the security benefits of a VM. The downside is slightly slower container start up times and might not work in nested virtualized environments.
评论 #19140638 未加载
评论 #19137021 未加载
评论 #19141399 未加载
评论 #19136443 未加载
CaliforniaKarlover 6 years ago
Debian’s security tracker, showing the affected versions, and (when available) the fixed versions: <a href="https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2019-5736" rel="nofollow">https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2019-5736</a><p>And Ubuntu’s: <a href="https:&#x2F;&#x2F;people.canonical.com&#x2F;~ubuntu-security&#x2F;cve&#x2F;2019&#x2F;CVE-2019-5736.html" rel="nofollow">https:&#x2F;&#x2F;people.canonical.com&#x2F;~ubuntu-security&#x2F;cve&#x2F;2019&#x2F;CVE-2...</a><p>Personally, I like these vs. RHEL, since all the info is on page.
评论 #19139316 未加载
wodnyover 6 years ago
The vulnerability description seems to be lacking an explanation why the &#x2F;proc&#x2F;$PID&#x2F;exe symlink is so special and why using the #!&#x2F;proc&#x2F;self&#x2F;exe hashbang will work while using #!&#x2F;usr&#x2F;sbin&#x2F;runc probably won&#x27;t. Am I right that the proc filesystem in proc_exe_link() fills the file_operations struct in a way that causes open() not to go through a dereferencing procedure using the filesystem but just open the file used to run the executable?
评论 #19148688 未加载
darren0over 6 years ago
The best fix is to upgrade to 18.09.2. For those that can&#x27;t do that immediately, backported versions of runc for Docker releases going back to 1.12.6 are available from Rancher at <a href="https:&#x2F;&#x2F;github.com&#x2F;rancher&#x2F;runc-cve" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rancher&#x2F;runc-cve</a>. But please only do that as a temporary workaround until you can properly upgrade to 18.09.2.<p>Please patch if you don&#x27;t 100% trust all users on your host.
评论 #19136329 未加载
评论 #19136685 未加载
yujie1984over 6 years ago
Mesosphere employee here. We have released the product advisory on this CVE. Please check out the advisory and update your software.<p><a href="https:&#x2F;&#x2F;support.mesosphere.com&#x2F;s&#x2F;article&#x2F;Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003" rel="nofollow">https:&#x2F;&#x2F;support.mesosphere.com&#x2F;s&#x2F;article&#x2F;Known-Issue-Contain...</a>
geggamover 6 years ago
Next year this exploit will still be in thousands if not millions of containers all over<p>There is a distinct lack of knowledge on how to manage a system in the container ecosystem
评论 #19141298 未加载
deathanatosover 6 years ago
Not that this shouldn&#x27;t be patched and all, but this seems like it is being treated with more urgency that is required.<p>If I am understanding the CVE correctly, you need to be able to launch <i>privileged</i> containers with an attacker-controlled image where the container user is root <i>and</i> not namespaced (i.e., the same root as the outside root user). How is this not &quot;on the wrong side of an airtight hatch[1]&quot;?<p>Am I missing something here? If you can start privileged containers, why not just execute evil.exe directly?<p>[1]: <a href="https:&#x2F;&#x2F;blogs.msdn.microsoft.com&#x2F;oldnewthing&#x2F;20060508-22&#x2F;?p=31283" rel="nofollow">https:&#x2F;&#x2F;blogs.msdn.microsoft.com&#x2F;oldnewthing&#x2F;20060508-22&#x2F;?p=...</a>
评论 #19138890 未加载
评论 #19138884 未加载
评论 #19138994 未加载
tyingqover 6 years ago
Is this something that non-privileged containers mitigates? Curious what the big barriers are to this. I know they exist, but aren&#x27;t used widely...I assume because some functionality doesn&#x27;t work.
评论 #19136381 未加载
评论 #19138610 未加载
koolbaover 6 years ago
Is this issue specific to containers running as root?
评论 #19136110 未加载
morpheuskafkaover 6 years ago
Yet to see an Ubuntu Security Notice released, I&#x27;m presuming an update to the docker.io package will be released?
评论 #19139681 未加载
pizlonatorover 6 years ago
Yikes that&#x27;s a big patch! Just on a meta-level, security vulnerabilities fixed with big patches are usually the least fun.<p>Also, I would bet that freshly written C code has about 1 RCE bug every 100 LoC. This patch has 236 LoCs so probably about 2.36 RCE&#x27;s.
评论 #19136283 未加载
评论 #19140894 未加载
评论 #19136439 未加载