Actually, the nature of this vulnerability would prevent any attacks against docker
>> The vulnerability does not enable the execution of arbitrary code but the exploit was able to inject a JavaScript payload into the local file context. This allowed it to search for and upload potentially sensitive local files.
Moreover, since it seems you believe that javascript is a liability in this case (as much as I loathe the language: it's not!)
be aware that you still need to interpret javascript to read all of the pdfs you can find:
>> The vulnerability does not enable the execution of arbitrary code but the exploit was able to inject a JavaScript payload into the local file context. This allowed it to search for and upload potentially sensitive local files.
Moreover, since it seems you believe that javascript is a liability in this case (as much as I loathe the language: it's not!)
be aware that you still need to interpret javascript to read all of the pdfs you can find:
http://mariomalwareanalysis.blogspot.co.uk/2012/02/how-to-em...
(I also remembe reading something about opengl embedded in pdf, but I cannot find it anymore)