RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
{ "vanir_signatures": [ { "signature_version": "v1", "deprecated": false, "id": "CVE-2016-9962-9357a1f5", "signature_type": "Line", "target": { "file": "libcontainer/nsenter/nsexec.c" }, "source": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5", "digest": { "threshold": 0.9, "line_hashes": [ "251821556443359960608428361047721063429", "141713138088543029735854453596287841678", "326703517834071923454907693393914892954" ] } }, { "signature_version": "v1", "deprecated": false, "id": "CVE-2016-9962-f00d1ad2", "signature_type": "Function", "target": { "file": "libcontainer/nsenter/nsexec.c", "function": "nsexec" }, "source": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5", "digest": { "length": 1328.0, "function_hash": "25902919256002851746070539443732366512" } } ] }