The following flaw was reported in Docker: By allowing volumes to override files of /proc within a mount namespace, a user could specify arbitrary policies for Linux Security Modules, including setting an unconfined policy underneath AppArmor, or a docker_t policy for processes managed by SELinux. In all versions of Docker up until 1.6.1, it is possible for malicious images to configure volume mounts such that files of proc may be overridden. Docker Engine 1.6.1 address this vulnerability. Acknowledgements: Red Hat would like to thank Eric Windisch of the Docker project for reporting this issue.
This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content.
Created docker-io tracking bugs for this issue: Affects: fedora-all [bug 1219715] Affects: epel-6 [bug 1219716]