Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ | permissions required |
http://seclists.org/fulldisclosure/2015/May/28 | third party advisory mailing list |
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html | vendor advisory mailing list third party advisory |
http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html | third party advisory vdb entry |
http://www.securityfocus.com/bid/74558 | broken link third party advisory vdb entry |