github.com/docker/libcontainer is vulnerable to privilege escalation attacks. These attacks are possible because github.com/docker/libcontainer and docker open the file-descriptor passed to pid-1 before performing chroot actions. The attacks can be triggered through a symlink attack.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/docker/libcontainer | eq | HEAD | |
docker | eq | 1.6.2__8.el7 |
lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
seclists.org/fulldisclosure/2015/May/28
github.com/docker/libcontainer/commit/46132cebcf391b56842f5cf9b247d508c59bc625
groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ