docs/advisories/cve_2019_5736.md
runc through 1.0-rc6, as used in Docker before 18.09.2, allows attackers to overwrite the host runc binary and consequently obtain host root access. For more information, please see the NIST advisory or the kubernetes advisory.
For kOps, kOps releases 1.11.1 or later include workarounds, but note that the fixes depend on the version of kubernetes you are running. Because kubernetes 1.10 and 1.11 were only validated with Docker version 17.03.x (and earlier), and because Docker has chosen not to offer fixes for 17.03 in OSS, there is no patched version.
You must update to kOps 1.11.1 (or later) if you are running kubernetes <= 1.11.x to get this fix
However, there is an alternative to
the patch which is less impactful and requires no source code changes: it is
possible to mark runc as immutable using chattr. Doing so protects against
the known exploits. The exception is privileged pods (that are effectively root
anyway) and pods that have explicitly been granted CAP_LINUX_IMMUTABLE in the
securityContext.capabilities.
If you are running pods that are not privileged but you grant
CAP_LINUX_IMMUTABLE in the
securityContext.capabilities, and are
running kubernetes 1.11 (or earlier), you should consider one of the
alternative fixes listed below