CVE-2016-9962

Priority
Medium
Description
RunC allowed additional container processes via 'runc exec' to be ptraced
by the pid 1 of the container. This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes
or modification of runC state before the process is fully placed inside the
container.
References
Package
Source: runc (LP Ubuntu Debian)
Upstream:released (0.1.1)
Ubuntu 17.10 (Artful Aardvark):released (1.0.0~rc2+docker1.13.1-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1)
Ubuntu 17.04 (Zesty Zapus):released (1.0.0~rc2+docker1.12.6-0ubuntu1)
Package
Upstream:released (1.13.1)
Ubuntu 17.10 (Artful Aardvark):released (1.13.1-0ubuntu4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):pending (1.13.1-0ubuntu1~16.04.1)
Ubuntu 17.04 (Zesty Zapus):pending (1.13.1-0ubuntu1~17.04.1)
More Information

Updated: 2017-10-23 12:27:59 UTC (commit 13562)