RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "docker.io",
"binary_version": "1.13.1-0ubuntu1~16.04.2"
},
{
"binary_name": "golang-docker-dev",
"binary_version": "1.13.1-0ubuntu1~16.04.2"
},
{
"binary_name": "golang-github-docker-docker-dev",
"binary_version": "1.13.1-0ubuntu1~16.04.2"
},
{
"binary_name": "vim-syntax-docker",
"binary_version": "1.13.1-0ubuntu1~16.04.2"
}
]
}