Search for packages
| purl | pkg:alpm/archlinux/runc@1.0.0rc5%2B168%2Bg079817cc-1 |
| Next non-vulnerable version | 1.0.0rc6-1 |
| Latest non-vulnerable version | 1.1.2-1 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7juj-78y7-g7b6
Aliases: CVE-2019-5736 |
Containment Errors (Container Errors) runc allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to `/proc/self/exe`. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:25:58.578238+00:00 | Arch Linux Importer | Affected by | VCID-7juj-78y7-g7b6 | https://security.archlinux.org/AVG-878 | 38.0.0 |