Search for packages
| purl | pkg:alpm/archlinux/docker@1:1.12.5-1 |
| Next non-vulnerable version | 1:1.12.6-1 |
| Latest non-vulnerable version | 1:20.10.11-1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-165g-hgmx-nybk
Aliases: CVE-2016-9962 GHSA-gp4j-w3vj-7299 |
Information Exposure in RunC RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:26:18.336044+00:00 | Arch Linux Importer | Affected by | VCID-165g-hgmx-nybk | https://security.archlinux.org/AVG-133 | 38.0.0 |