Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9962

Опубликовано: 31 янв. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 6.4

Описание

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

РелизСтатусПримечание
artful

released

1.13.1-0ubuntu4
bionic

released

1.13.1-0ubuntu4
cosmic

released

1.13.1-0ubuntu4
devel

released

1.13.1-0ubuntu4
disco

released

1.13.1-0ubuntu4
esm-apps/bionic

released

1.13.1-0ubuntu4
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was deferred]
esm-infra/xenial

released

1.13.1-0ubuntu1~16.04.1
precise

DNE

precise/esm

DNE

Показывать по

РелизСтатусПримечание
artful

released

1.0.0~rc2+docker1.13.1-0ubuntu1
bionic

released

1.0.0~rc2+docker1.13.1-0ubuntu1
cosmic

released

1.0.0~rc2+docker1.13.1-0ubuntu1
devel

released

1.0.0~rc2+docker1.13.1-0ubuntu1
disco

released

1.0.0~rc2+docker1.13.1-0ubuntu1
esm-apps/bionic

released

1.0.0~rc2+docker1.13.1-0ubuntu1
esm-apps/xenial

not-affected

1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

Показывать по

EPSS

Процентиль: 41%
0.00187
Низкий

4.4 Medium

CVSS2

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 9 лет назад

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

CVSS3: 6.4
nvd
почти 9 лет назад

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

CVSS3: 6.4
debian
почти 9 лет назад

RunC allowed additional container processes via 'runc exec' to be ptra ...

suse-cvrf
почти 9 лет назад

Security update for containerd, docker, runc

suse-cvrf
почти 9 лет назад

Security update for containerd, docker, runc

EPSS

Процентиль: 41%
0.00187
Низкий

4.4 Medium

CVSS2

6.4 Medium

CVSS3

Уязвимость CVE-2016-9962