Information Exposure in RunC
Moderate severity
GitHub Reviewed
Published
Dec 20, 2021
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Package
Affected versions
<= 1.0.0-rc2
Patched versions
1.0.0-rc3
Description
Reviewed
May 20, 2021
Published to the GitHub Advisory Database
Dec 20, 2021
Last updated
Jan 9, 2023
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
References