github.com/opencontainers/runc is vulnerable to information disclosure attacks. These attacks are possible because a run exec
command can be ptraced by the pid 1 of the container. Using this, it allows attackers to gain access to the file-descriptors of new processes during initialization. It may also lead to container escapes and the modification of the github.com/opencontainers/runc state before a process is fully places into a container. This only happens if the main processes of the container is running as root. This transitively affects docker.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/opencontainers/runc | eq | 1.0.0-rc2 | |
github.com/opencontainers/runc | eq | HEAD |