Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Docker | Docker | * | 1.6 (including) |
Libcontainer | Docker | * | 1.6.0 (including) |
Red Hat Enterprise Linux 7 Extras | RedHat | docker-0:1.6.2-14.el7 | * |
Docker.io | Ubuntu | trusty | * |
Docker.io | Ubuntu | upstream | * |
Docker.io | Ubuntu | utopic | * |
Docker.io | Ubuntu | vivid | * |
Docker.io | Ubuntu | wily | * |
Docker.io | Ubuntu | yakkety | * |