MGASA-2017-0189

Source
https://advisories.mageia.org/MGASA-2017-0189.html
Import Source
https://advisories.mageia.org/MGASA-2017-0189.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0189
Related
Published
2017-06-28T10:01:20Z
Modified
2017-06-27T05:45:51Z
Summary
Updated docker packages fix security vulnerability
Details

The runc component used by docker exec feature of docker allowed additional container processes to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception (CVE-2016-9962).

References
Credits

Affected packages

Mageia:5 / docker

Package

Name
docker
Purl
pkg:rpm/mageia/docker?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.1-1.2.mga5

Ecosystem specific

{
    "section": "core"
}