Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAB6KFYBj3Jz2ZL1oeyH2RJmm43PNuroH_-5EiLptTdEs8qvN_Q@mail.gmail.com>
Date: Tue, 10 Jan 2017 17:58:56 -0800
From: Nathan McCauley <nathan.mccauley@...ker.com>
To: docker-user@...glegroups.com, docker-dev@...glegroups.com, 
	fulldisclosure@...lists.org, oss-security@...ts.openwall.com, 
	vuln@...unia.com, bugtraq@...urityfocus.com
Subject: Docker 1.12.6 - Security Advisory

Docker Engine version 1.12.6 has been released to address a vulnerability
and is immediately available for all supported platforms. Users are advised
to upgrade existing installations of the Docker Engine and use 1.12.6 for
new installations.

Please send any questions to security@...ker.com.


==============================================================
[CVE-2016-9962] Insecure opening of file-descriptor allows privilege
escalation

==============================================================

RunC allowed additional container processes via `runc exec` to be ptraced
by the pid 1 of the container.  This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes
or modification of runC state before the process is fully placed inside the
container


Credit for this discovery goes to Aleksa Sarai from SUSE and Tõnis Tiigi
from Docker.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.