|
Message-ID: <CAB6KFYBj3Jz2ZL1oeyH2RJmm43PNuroH_-5EiLptTdEs8qvN_Q@mail.gmail.com> Date: Tue, 10 Jan 2017 17:58:56 -0800 From: Nathan McCauley <nathan.mccauley@...ker.com> To: docker-user@...glegroups.com, docker-dev@...glegroups.com, fulldisclosure@...lists.org, oss-security@...ts.openwall.com, vuln@...unia.com, bugtraq@...urityfocus.com Subject: Docker 1.12.6 - Security Advisory Docker Engine version 1.12.6 has been released to address a vulnerability and is immediately available for all supported platforms. Users are advised to upgrade existing installations of the Docker Engine and use 1.12.6 for new installations. Please send any questions to security@...ker.com. ============================================================== [CVE-2016-9962] Insecure opening of file-descriptor allows privilege escalation ============================================================== RunC allowed additional container processes via `runc exec` to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container Credit for this discovery goes to Aleksa Sarai from SUSE and Tõnis Tiigi from Docker.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.