Information Exposure Affecting github.com/opencontainers/runc/libcontainer package, versions <1.0.0-rc3
Threat Intelligence
EPSS
0.07% (30th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINER-50017
- published 8 Dec 2016
- disclosed 8 Dec 2016
- credit Unknown
Introduced: 8 Dec 2016
CVE-2016-9962 Open this link in a new tabOverview
Affected version of github.com/opencontainers/libcontainer
are vulnerable to Information Exposure.
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
References
CVSS Scores
version 3.1