CVE-2016-9962

NameCVE-2016-9962
DescriptionRunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs850951, 850952

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
docker.io (PTS)buster, buster (security)18.09.1+dfsg1-7.1+deb10u3fixed
bullseye20.10.5+dfsg1-1+deb11u2fixed
bookworm20.10.24+dfsg1-1fixed
trixie20.10.25+dfsg1-2fixed
sid20.10.25+dfsg1-3fixed
runc (PTS)stretch (security), stretch (lts), stretch0.1.1+dfsg1-2+deb9u3fixed
buster1.0.0~rc6+dfsg1-3fixed
buster (security)1.0.0~rc6+dfsg1-3+deb10u3fixed
bullseye (security), bullseye1.0.0~rc93+ds1-5+deb11u3fixed
bookworm (security), bookworm1.1.5+ds1-1+deb12u1fixed
sid, trixie1.1.12+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
docker.iosource(unstable)1.13.1~ds1-2850952
runcsource(unstable)0.1.1+dfsg1-2850951

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1012568
https://github.com/docker/docker/compare/v1.12.5...v1.12.6
https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5

Search for package or bug name: Reporting problems