Information Exposure Affecting github.com/opencontainers/runc/libcontainer package, versions <1.0.0-rc3
Snyk CVSS
Attack Complexity
High
Privileges Required
High
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.07% (28th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINER-50017
- published 8 Dec 2016
- disclosed 8 Dec 2016
- credit Unknown
Introduced: 8 Dec 2016
CVE-2016-9962 Open this link in a new tabOverview
Affected version of github.com/opencontainers/libcontainer
are vulnerable to Information Exposure.
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.