Name | CVE-2016-8867 |
Description | Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
NVD severity | medium |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
docker.io (PTS) | buster | 18.09.1+dfsg1-7.1+deb10u2 | fixed |
| buster (security) | 18.09.1+dfsg1-7.1+deb10u3 | fixed |
| bullseye | 20.10.3+dfsg1-2 | fixed |
| sid | 20.10.4+dfsg1-1 | fixed |
runc (PTS) | stretch | 0.1.1+dfsg1-2+deb9u1 | fixed |
| stretch (security) | 0.1.1+dfsg1-2+deb9u2 | fixed |
| buster | 1.0.0~rc6+dfsg1-3 | fixed |
| bullseye, sid | 1.0.0~rc93+ds1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
docker.io | source | (unstable) | (not affected) | | | |
runc | source | (unstable) | (not affected) | | | |
Notes
- docker.io <not-affected> (Not built from/with a runc with "ambient capabilities")
- runc <not-affected> ("ambient capabilities" introduced later, cf bug #853240)
https://github.com/docker/docker/issues/27590
docker: https://github.com/docker/docker/pull/27610/commits/d60a3418d0268745dff38947bc8c929fbd24f837 (1.12.3)
runc: https://github.com/opencontainers/runc/commit/a83f5bac28554fa0fd49bc1559a3c79f5907348f
docker.io not directly affected but will need to be updated to include new runc version
runc: "ambient capabilities" functionality added upstream with https://github.com/opencontainers/runc/pull/1086
and later changes.
The actual fix seem to be to revert the commit which introduced ambient capabilities
in runc.