A vulnerability in runC could lead to privilege escalation.
|Package||app-emulation/runc on all architectures|
|Affected versions||< 1.0.0_rc2-r2|
|Unaffected versions||>= 1.0.0_rc2-r2|
RunC is a CLI tool for spawning and running containers according to the OCI specification.
A vulnerability was discovered in runC that allows additional container processes via ‘runc exec’ to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes.
An attacker, who is able to successfully escape the container or modify runC’s state before process initialization, could escalate privileges.
There is no known workaround at this time.
All runC users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/runc-1.0.0_rc2-r2"
January 12, 2017
January 12, 2017: 1