RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
[
{
"source": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"251821556443359960608428361047721063429",
"141713138088543029735854453596287841678",
"326703517834071923454907693393914892954"
]
},
"target": {
"file": "libcontainer/nsenter/nsexec.c"
},
"id": "CVE-2016-9962-9357a1f5",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5",
"deprecated": false,
"digest": {
"function_hash": "25902919256002851746070539443732366512",
"length": 1328.0
},
"target": {
"function": "nsexec",
"file": "libcontainer/nsenter/nsexec.c"
},
"id": "CVE-2016-9962-f00d1ad2",
"signature_version": "v1",
"signature_type": "Function"
}
]