oss-sec mailing list archives
Re: Docker 1.12.6 - Security Advisory
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 10 Jan 2017 19:29:40 -0700
Can you post a link to a patch for this issue, or to a bug entry with additional details, or the download site at a minimum? Thanks! On Tue, Jan 10, 2017 at 6:58 PM, Nathan McCauley <nathan.mccauley () docker com
wrote:
Docker Engine version 1.12.6 has been released to address a vulnerability and is immediately available for all supported platforms. Users are advised to upgrade existing installations of the Docker Engine and use 1.12.6 for new installations. Please send any questions to security () docker com. ============================================================== [CVE-2016-9962] Insecure opening of file-descriptor allows privilege escalation ============================================================== RunC allowed additional container processes via `runc exec` to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container Credit for this discovery goes to Aleksa Sarai from SUSE and Tõnis Tiigi from Docker.
-- -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security contact: secalert () redhat com
Current thread:
- Docker 1.12.6 - Security Advisory Nathan McCauley (Jan 10)
- Re: Docker 1.12.6 - Security Advisory Kurt Seifried (Jan 10)
- Re: Docker 1.12.6 - Security Advisory Andreas Stieger (Jan 11)
- Re: Docker 1.12.6 - Security Advisory Trevor Jay (Jan 11)
- Re: Docker 1.12.6 - Security Advisory Kurt Seifried (Jan 10)