Red Hat Bugzilla – Bug 1390163
CVE-2016-8867 docker: Ambient capability usage in containers
Last modified: 2018-06-29 18:15:39 EDT
It was found that Docker 1.12.2 did not correctly apply user permissions in containers Upstream bug: https://github.com/docker/docker/issues/27590 Upstream patch: https://github.com/docker/docker/pull/27610/commits/d60a3418d0268745dff38947bc8c929fbd24f837
This seems to be the actual fix attempt: https://github.com/opencontainers/runc/commit/a83f5bac28554fa0fd49bc1559a3c79f5907348f The fix looks correct. It deals with an embedded ')', as long as newer kernel versions do not add more non-escaped free-text fields at the end which could contain another ')'.
No, the actual fix was to revert the commit which introduced ambient capabilities in runc afaict (I don't have the link handy). The runc version we use in projectatomic/runc in branch docker-1.12.3 contains the actual fix. That commit is just a fix for a panic afaict (?)
(In reply to Antonio Murdaca from comment #2) > No, the actual fix was to revert the commit which introduced ambient > capabilities in runc afaict (I don't have the link handy). > > The runc version we use in projectatomic/runc in branch docker-1.12.3 > contains the actual fix. > > That commit is just a fix for a panic afaict (?) Ohh, that might be the case. I thought it might cause the process start time to be misidentified, which could be a security problem in itself because PID and start time are sometimes (ab)used as a unique ID.