Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday May 29 2019, @11:07PM   Printer-friendly
from the what-to-do-now? dept.

All versions of Docker are currently vulnerable to a race condition that could give an attacker both read and write access to any file on the host system. Proof-of-concept code has been released.

The flaw is similar to CVE-2018-15664 and it offers a window of opportunity for hackers to modify resource paths after resolution but before the assigned program starts operating on the resource. This is known as a time-to-check-time-to-use (TOCTOU) type of bug.

Source:
https://www.bleepingcomputer.com/news/security/unpatched-flaw-affects-all-docker-versions-exploits-ready/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by HiThere on Thursday May 30 2019, @12:32AM (1 child)

    by HiThere (866) Subscriber Badge on Thursday May 30 2019, @12:32AM (#849124) Journal

    Can I suggest that this is another reason that sudo is a very bad idea? And unless you're saying that nobody has access to docker-cli, it's a major problem at your site?

    --
    Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Thursday May 30 2019, @01:05AM

    by Anonymous Coward on Thursday May 30 2019, @01:05AM (#849134)

    If you give sudo to untrustworthy people sure it a problem, but in a small team it's not.