Can you post a link to a patch for this issue, or to a bug entry with additional details, or the download site at a minimum? Thanks!
On Tue, Jan 10, 2017 at 6:58 PM, Nathan McCauley <[email protected] > wrote: > Docker Engine version 1.12.6 has been released to address a vulnerability > and is immediately available for all supported platforms. Users are advised > to upgrade existing installations of the Docker Engine and use 1.12.6 for > new installations. > > Please send any questions to [email protected]. > > > ============================================================== > [CVE-2016-9962] Insecure opening of file-descriptor allows privilege > escalation > > ============================================================== > > RunC allowed additional container processes via `runc exec` to be ptraced > by the pid 1 of the container. This allows the main processes of the > container, if running as root, to gain access to file-descriptors of these > new processes during the initialization and can lead to container escapes > or modification of runC state before the process is fully placed inside the > container > > > Credit for this discovery goes to Aleksa Sarai from SUSE and Tõnis Tiigi > from Docker. > -- -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security contact: [email protected] _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
