CVE-2016-9962

EUVD-2021-2523
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 MEDIUM
LOCAL
HIGH
HIGH
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
Affected Products (NVD)
VendorProductVersion
dockerdocker
1.11.0 ≤
𝑥
< 1.12.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
docker.io
bookworm
20.10.24+dfsg1-1
fixed
bullseye
20.10.5+dfsg1-1+deb11u2
fixed
bullseye (security)
20.10.5+dfsg1-1+deb11u3
fixed
sid
26.1.5+dfsg1-4
fixed
trixie
26.1.5+dfsg1-2
fixed
runc
bookworm
1.1.5+ds1-1+deb12u1
fixed
bookworm (security)
1.1.5+ds1-1+deb12u1
fixed
bullseye
1.0.0~rc93+ds1-5+deb11u5
fixed
bullseye (security)
1.0.0~rc93+ds1-5+deb11u3
fixed
sid
1.1.15+ds1-1
fixed
trixie
1.1.12+ds1-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
docker.io
artful
Fixed 1.13.1-0ubuntu4
released
bionic
Fixed 1.13.1-0ubuntu4
released
cosmic
Fixed 1.13.1-0ubuntu4
released
disco
Fixed 1.13.1-0ubuntu4
released
precise
dne
trusty
dne
xenial
Fixed 1.13.1-0ubuntu1~16.04.1
released
yakkety
ignored
zesty
Fixed 1.13.1-0ubuntu1~17.04.1
released
runc
artful
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
bionic
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
cosmic
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
disco
Fixed 1.0.0~rc2+docker1.13.1-0ubuntu1
released
precise
dne
trusty
dne
xenial
not-affected
yakkety
ignored
zesty
Fixed 1.0.0~rc2+docker1.12.6-0ubuntu1
released
References