In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Published: 2019-11-21
Proof-of-concept (PoC) code for a security flaw in Docker, the popular containerization platform, is now public. Background On November 19, researchers at Unit 42, Palo Alto Networks’ research team, published their analysis of a severe vulnerability in the popular container deployment platform, Docker.
https://www.debian.org/security/2019/dsa-4521
https://security.netapp.com/advisory/ntap-20190828-0003/
https://seclists.org/bugtraq/2019/Sep/21
https://github.com/moby/moby/issues/39449
https://docs.docker.com/engine/release-notes/
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html