Related Articles
All Mix →Concepts | Daniel Miessler
This is one of my most ambitious projects, as it aims to capture everything I learn through books, film, education, life experience, contemplation, etc. into…
Roleplaying: D&D and Creativity | Daniel Miessler
I’ve been a role-player since 7th grade and had the good fortune of being indoctrinated into a very elite form of the hobby — custom…
All in on flexible and efficient integrations
Table of Contents Users appreciate flexible integrations that support efficient workflows Users will need to switch to our integration platform by 15 October Join our…
Battle of The AI Art Engines: Midjourney vs. DALL-E
Midjourney is like using a Mac, and DALL-E is like using the Linux command line Created/Updated: August 21, 2022 Created by Midjourney We’ve all been…
Anthropic Expands Their Model Safety Bug Bounty Program
Table of Contents Expanding Our Model Safety Bug Bounty Program Our Approach Get Involved Expanding Our Model Safety Bug Bounty Program The rapid progression of…
Nanotech Musings
I’ve been thinking a lot about the future lately. A couple days ago I started fantisizing about what nanotechnology > could mean to the medical…


Impact
When using
--userns-remap, if the root user in the remapped namespace has access to the host filesystem they can modify files under/var/lib/docker/that cause writing files with extended privileges.Patches
Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
Credits
Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @BassMatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to security@docker.com