A vulnerability in Service Fabric allows Linux containers to escalate their privileges in
order to gain root privileges on the node, and then compromise all of the nodes in the cluster.
An attacker would need to have read/write access to the cluster, and the vulnerability could be
exploited on containers that are configured to have runtime access, but this is granted by default
to every container. Though the bug exists in both the Windows and Linux versions, it is only
exploitable on Linux.
Users can check their current Service Fabric version by navigating to their Service Fabric
cluster in the Azure console and then clicking on "Fabric upgrades".
If the Fabric upgrade mode is configured to "Automatic", the cluster will be updated automatically
to the latest secure version. If Fabric upgrade mode is configured to "Manual",
customers must update it manually to the latest version (9.0.1035.1 or higher).