oss-sec mailing list archives
Docker 1.12.6 - Security Advisory
From: Nathan McCauley <nathan.mccauley () docker com>
Date: Tue, 10 Jan 2017 17:58:56 -0800
Docker Engine version 1.12.6 has been released to address a vulnerability and is immediately available for all supported platforms. Users are advised to upgrade existing installations of the Docker Engine and use 1.12.6 for new installations. Please send any questions to security () docker com. ============================================================== [CVE-2016-9962] Insecure opening of file-descriptor allows privilege escalation ============================================================== RunC allowed additional container processes via `runc exec` to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container Credit for this discovery goes to Aleksa Sarai from SUSE and Tõnis Tiigi from Docker.
Current thread:
- Docker 1.12.6 - Security Advisory Nathan McCauley (Jan 10)
- Re: Docker 1.12.6 - Security Advisory Kurt Seifried (Jan 10)
- Re: Docker 1.12.6 - Security Advisory Andreas Stieger (Jan 11)
- Re: Docker 1.12.6 - Security Advisory Trevor Jay (Jan 11)
- Re: Docker 1.12.6 - Security Advisory Kurt Seifried (Jan 10)