Search for packages
purl | pkg:alpm/archlinux/runc@0.1.1-4 |
Next non-vulnerable version | 1.0.0rc5+19+g69663f0b-1 |
Latest non-vulnerable version | 1.1.2-1 |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-funr-5s9t-aaak
Aliases: CVE-2016-9962 GHSA-gp4j-w3vj-7299 |
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:16.119475+00:00 | Arch Linux Importer | Affected by | VCID-funr-5s9t-aaak | https://security.archlinux.org/AVG-134 | 36.0.0 |
2024-09-18T02:01:27.249378+00:00 | Arch Linux Importer | Affected by | VCID-funr-5s9t-aaak | https://security.archlinux.org/AVG-134 | 34.0.1 |
2024-01-03T22:27:36.960922+00:00 | Arch Linux Importer | Affected by | VCID-funr-5s9t-aaak | https://security.archlinux.org/AVG-134 | 34.0.0rc1 |