Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+q1=fTZxdEBOCoUTSXgusCP1k4wm_fJJqSLyucqbjs5LE+1_A@mail.gmail.com>
Date: Mon, 5 Sep 2016 16:26:02 -0700
From: Diogo Mónica <diogo.monica@...ker.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: cve request: docker swarm node Dos occurs when join a cluster failed
 using local CA certificate

>From I can understand from this report, the author creates a swarm, messes
with the local certificate for a worker, and then tries to join the swarm.
The worker fails because the author messed with the local state.

This does not make the manager not available to the rest of the worker
nodes, and is essentially a self-DoS (I modified my local configuration in
such a way that docker doesn't run).

A simple rm -rf /var/lib/docker/swarm should clean all the state. Not CVE
worthy.

-- 
Diogo Mónica

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.