Information Exposure Affecting github.com/opencontainers/runc/libcontainer package, versions <1.0.0-rc3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINER-50017
  • published8 Dec 2016
  • disclosed8 Dec 2016
  • creditUnknown

Introduced: 8 Dec 2016

CVE-2016-9962  (opens in a new tab)
CWE-200  (opens in a new tab)

Overview

Affected version of github.com/opencontainers/libcontainer are vulnerable to Information Exposure. RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

CVSS Scores

version 3.1