The following flaw was reported in Docker: Libcontainer version 1.6.0 introduced changes which facilitated a mount namespace breakout upon respawn of a container. This allowed malicious images to write files to the host system and escape containerization. Libcontainer and Docker Engine 1.6.1 address this vulnerability. Acknowledgements: Red Hat would like to thank Eric Windisch of the Docker project for reporting this issue.
This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content.
Created docker-io tracking bugs for this issue: Affects: fedora-all [bug 1219703] Affects: epel-6 [bug 1219704]