CVE-2016-9962

Priority
Description
RunC allowed additional container processes via 'runc exec' to be ptraced
by the pid 1 of the container. This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes
or modification of runC state before the process is fully placed inside the
container.
Notes
Package
Upstream:released (1.13.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was deferred)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.13.1-0ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.13.1-0ubuntu4)
Package
Source: runc (LP Ubuntu Debian)
Upstream:released (0.1.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.0.0~rc2+docker1.13.1-0ubuntu1)
Patches:
Upstream:
More Information

Updated: 2020-09-10 05:33:51 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)