CVE-2016-9962 (retired)

Priority
Description
RunC allowed additional container processes via 'runc exec' to be ptraced
by the pid 1 of the container. This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes
or modification of runC state before the process is fully placed inside the
container.
Notes
Package
Upstream:released (1.13.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was deferred)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.13.1-0ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.13.1-0ubuntu4)
Ubuntu 19.04 (Disco Dingo):released (1.13.1-0ubuntu4)
Ubuntu 19.10 (Eoan):released (1.13.1-0ubuntu4)
Package
Source: runc (LP Ubuntu Debian)
Upstream:released (0.1.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.0.0~rc2+docker1.13.1-0ubuntu1)
Ubuntu 19.04 (Disco Dingo):released (1.0.0~rc2+docker1.13.1-0ubuntu1)
Ubuntu 19.10 (Eoan):released (1.0.0~rc2+docker1.13.1-0ubuntu1)
Patches:
Upstream:https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5
More Information

Updated: 2019-10-09 07:57:58 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)