Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 605378 (CVE-2016-9962) - <app-emulation/runc-1.0.0_rc2-r2: privilege escalation
Summary: <app-emulation/runc-1.0.0_rc2-r2: privilege escalation
Status: RESOLVED FIXED
Alias: CVE-2016-9962
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: http://seclists.org/fulldisclosure/20...
Whiteboard: B1 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-01-11 11:39 UTC by Manuel Rüger
Modified: 2017-02-09 10:27 UTC (History)
3 users (show)

See Also:
Package list:
=app-emulation/runc-1.0.0_rc2-r2
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Manuel Rüger gentoo-dev 2017-01-11 11:39:44 UTC
From URL:
RunC allowed additional container processes via `runc exec` to be ptraced
by the pid 1 of the container.  This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes
or modification of runC state before the process is fully placed inside the
container


Applied a patch that should fix the vulnerability in 1.0.0_rc2-r2.
Comment 1 Thomas Deutschmann gentoo-dev Security 2017-01-11 12:50:47 UTC
@ Arches,

please test and mark stable: =app-emulation/runc-1.0.0_rc2-r2
Comment 2 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-01-12 09:56:04 UTC
Please re-CC amd64 when the dependent test failure is resolved.
Comment 3 Agostino Sarubbo gentoo-dev 2017-01-12 11:11:41 UTC
(In reply to Aaron Bauman from comment #2)
> Please re-CC amd64 when the dependent test failure is resolved.

test failures do not block security bugs. Please proceed
Comment 4 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-01-12 11:17:03 UTC
(In reply to Agostino Sarubbo from comment #3)
> (In reply to Aaron Bauman from comment #2)
> > Please re-CC amd64 when the dependent test failure is resolved.
> 
> test failures do not block security bugs. Please proceed

My fault.  amd64 stable.
Comment 5 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-01-12 13:32:45 UTC
@maintainers, please clean the vulnerable versions.
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2017-01-12 22:56:06 UTC
This issue was resolved and addressed in
 GLSA 201701-34 at https://security.gentoo.org/glsa/201701-34
by GLSA coordinator Aaron Bauman (b-man).
Comment 7 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-01-12 22:56:29 UTC
reopened for cleanup.
Comment 8 Manuel Rüger gentoo-dev 2017-02-06 14:31:40 UTC
Cleaned up:

commit b957c6bcb4ec8cd6fca134a865fc77ea2c05fe9e
Author: Manuel Rüger <mrueg@gentoo.org>
Date:   Mon Feb 6 15:30:53 2017 +0100

    app-emulation/runc: Remove old
    
    Package-Manager: Portage-2.3.3, Repoman-2.3.1
Comment 9 Thomas Deutschmann gentoo-dev Security 2017-02-09 10:27:37 UTC
Repository is now clean, all done.