github.com/docker/docker is vulnerable to information disclosure. Attackers can obtain sensitive information, modify the host and perform protocol downgrade attacks using a docker image. These attacks are possible because github.com/docker/docker uses weak permissions for files in the /proc
folder.
lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
seclists.org/fulldisclosure/2015/May/28
www.securityfocus.com/bid/74566
github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660
groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ