CVE-2016-9962

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.4 MEDIUM
LOCAL
HIGH
HIGH
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
dockerdocker
1.11.0 ≤
𝑥
< 1.12.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
docker.io
bullseye
20.10.5+dfsg1-1+deb11u2
fixed
bullseye (security)
20.10.5+dfsg1-1+deb11u3
fixed
bookworm
20.10.24+dfsg1-1
fixed
trixie
26.1.5+dfsg1-2
fixed
sid
26.1.5+dfsg1-4
fixed
runc
bullseye
1.0.0~rc93+ds1-5+deb11u5
fixed
bullseye (security)
1.0.0~rc93+ds1-5+deb11u3
fixed
bookworm
1.1.5+ds1-1+deb12u1
fixed
bookworm (security)
1.1.5+ds1-1+deb12u1
fixed
trixie
1.1.12+ds1-5.1
fixed
sid
1.1.15+ds1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
docker.io
disco
Fixed 1.13.1-0ubuntu4
released
cosmic
Fixed 1.13.1-0ubuntu4
released
bionic
Fixed 1.13.1-0ubuntu4
released
artful
Fixed 1.13.1-0ubuntu4
released
zesty
Fixed 1.13.1-0ubuntu1~17.04.1
released
yakkety
ignored
xenial
Fixed 1.13.1-0ubuntu1~16.04.1
released
trusty
dne
precise
dne
runc
disco
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
cosmic
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
bionic
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
artful
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
zesty
Fixed 1.0.0~rc2+docker1.12.6-0ubuntu1
released
yakkety
ignored
xenial
not-affected
trusty
dne
precise
dne
References