All Systems Operational

CVE Hub

beta
CVE-2019-0204
HIGH [7.8]
Last Modified: 11/21/2024
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.
access.redhat.com logo
https://access.redhat.com/errata/RHSA-2019:3892
access.redhat.com logo
https://access.redhat.com/errata/RHSA-2019:3892
lists.apache.org logo
https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E
+3
CVE-2019-5736
HIGH [8.6]
Last Modified: 11/21/2024
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
github.com logo
https://github.com/Frichetten/CVE-2019-5736-PoC
github.com logo
https://github.com/docker/docker-ce/releases/tag/v18.09.2
github.com logo
https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
+129
CVE-2018-20699
denial of service
MEDIUM [4.9]
Last Modified: 11/21/2024
Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
github.com logo
https://github.com/docker/engine/pull/70
github.com logo
https://github.com/moby/moby/pull/37967
github.com logo
https://github.com/docker/engine/pull/70
+3
CVE-2018-18548
xss
MEDIUM [6.1]
Last Modified: 11/21/2024
ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.
exploit-db.com logo
https://www.exploit-db.com/exploits/45691/
exploit-db.com logo
https://www.exploit-db.com/exploits/45691/
numanozdemir.com logo
https://numanozdemir.com/ajenti-xss.txt
+3
CVE-2018-3213
HIGH [7.5]
Last Modified: 11/21/2024
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Docker Images). The supported version that is affected is prior to Docker 12.2.1.3.20180913. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
oracle.com logo
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
oracle.com logo
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
securityfocus.com logo
http://www.securityfocus.com/bid/105633
+5
CVE-2018-12608
HIGH [7.5]
Last Modified: 11/21/2024
An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
github.com logo
https://github.com/moby/moby/pull/33182
github.com logo
https://github.com/moby/moby/pull/33182
CVE-2018-15514
HIGH [8.8]
Last Modified: 11/21/2024
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
docs.docker.com logo
https://docs.docker.com/docker-for-windows/edge-release-notes/
docs.docker.com logo
https://docs.docker.com/docker-for-windows/release-notes/
docs.docker.com logo
https://docs.docker.com/docker-for-windows/edge-release-notes/
+5
CVE-2018-11757
CRITICAL [9.8]
Last Modified: 11/21/2024
In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
github.com logo
https://github.com/apache/incubator-openwhisk-runtime-docker/commit/891896f25c39bc336ef6dda53f80f466ac4ca3c8
github.com logo
https://github.com/apache/incubator-openwhisk-runtime-docker/commit/891896f25c39bc336ef6dda53f80f466ac4ca3c8
lists.apache.org logo
https://lists.apache.org/thread.html/0b6d8a677f1c063ed32eb3638ef4d1a47dfba8907de4b222ddd24b05%40%3Cdev.openwhisk.apache.org%3E
+4
CVE-2018-11756
CRITICAL [9.8]
Last Modified: 11/21/2024
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
github.com logo
https://github.com/apache/incubator-openwhisk-runtime-php/commit/6caf902f527250ee4b7b695929b628d560e0dad1
github.com logo
https://github.com/apache/incubator-openwhisk-runtime-php/commit/6caf902f527250ee4b7b695929b628d560e0dad1
lists.apache.org logo
https://lists.apache.org/thread.html/439bd5ff5822708c645a0d816ed9914b88c97eda32eae6ea211bc0dc%40%3Cdev.openwhisk.apache.org%3E
+4
CVE-2018-10892
MEDIUM [5.3]
Last Modified: 11/21/2024
The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
github.com logo
https://github.com/moby/moby/pull/37404
github.com logo
https://github.com/moby/moby/pull/37404
access.redhat.com logo
https://access.redhat.com/errata/RHBA-2018:2796
+9
CVE-2017-0913
MEDIUM [4.7]
Last Modified: 11/21/2024
Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization".
community.ubnt.com logo
https://community.ubnt.com/t5/UCRM/New-UCRM-upgrades-available-2-8-2-and-2-9-0-beta3/td-p/2211814
community.ubnt.com logo
https://community.ubnt.com/t5/UCRM/New-UCRM-upgrades-available-2-8-2-and-2-9-0-beta3/td-p/2211814
hackerone.com logo
https://hackerone.com/reports/301406
+1
CVE-2018-1277
rce
MEDIUM [6.5]
Last Modified: 11/21/2024
Cloud Foundry Garden-runC, versions prior to 1.13.0, does not correctly enforce disc quotas for Docker image layers. A remote authenticated user may push an app with a malicious Docker image that will consume more space on a Diego cell than allocated in their quota, potentially causing a DoS against the cell.
cloudfoundry.org logo
https://www.cloudfoundry.org/blog/cve-2018-1277/
cloudfoundry.org logo
https://www.cloudfoundry.org/blog/cve-2018-1277/
CVE-2018-10205
MEDIUM [5.3]
Last Modified: 11/21/2024
hyperstart 1.0.0 in HyperHQ Hyper has memory leaks in the container_setup_modules and hyper_rescan_scsi functions in container.c, related to runV 1.0.0 for Docker.
github.com logo
https://github.com/hyperhq/hyperstart/pull/350
github.com logo
https://github.com/hyperhq/hyperstart/pull/350
CVE-2015-9259
CRITICAL [9.8]
Last Modified: 11/21/2024
In Docker Notary before 0.1, the checkRoot function in gotuf/client/client.go does not check expiry of root.json files, despite a comment stating that it does. Even if a user creates a new root.json file after a key compromise, an attacker can produce update files referring to an old root.json file.
github.com logo
https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf
github.com logo
https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf
docs.docker.com logo
https://docs.docker.com/notary/changelog/
+1
CVE-2015-9258
HIGH [7.5]
Last Modified: 11/21/2024
In Docker Notary before 0.1, gotuf/signed/verify.go has a Signature Algorithm Not Matched to Key vulnerability. Because an attacker controls the field specifying the signature algorithm, they might (for example) be able to forge a signature by forcing a misinterpretation of an RSA-PSS key as Ed25519 elliptic-curve data.
github.com logo
https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf
github.com logo
https://github.com/theupdateframework/notary/blob/master/docs/resources/ncc_docker_notary_audit_2015_07_31.pdf
docs.docker.com logo
https://docs.docker.com/notary/changelog/
+1
CVE-2014-5282
HIGH [8.1]
Last Modified: 11/21/2024
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1168436
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1168436
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ
+1
CVE-2014-5280
csrf
HIGH [8.8]
Last Modified: 11/21/2024
boot2docker 1.2 and earlier allows attackers to conduct cross-site request forgery (CSRF) attacks by leveraging Docker daemons enabling TCP connections without TLS authentication.
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ
CVE-2014-5279
HIGH [8.8]
Last Modified: 11/21/2024
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ
CVE-2017-16539
MEDIUM [5.9]
Last Modified: 11/21/2024
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
github.com logo
https://github.com/moby/moby/pull/35399
github.com logo
https://github.com/moby/moby/pull/35399/commits/a21ecdf3c8a343a7c94e4c4d01b178c87ca7aaa1
github.com logo
https://github.com/moby/moby/pull/35399
+7
CVE-2017-14992
denial of service
MEDIUM [6.5]
Last Modified: 11/21/2024
Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.
github.com logo
https://github.com/moby/moby/issues/35075
github.com logo
https://github.com/moby/moby/issues/35075
blog.cloudpassage.com logo
https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992/
+1
CVE-2017-10940
HIGH [8.8]
Last Modified: 11/21/2024
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Joyent Smart Data Center prior to agentsshar@1.0.0-release-20160901-20160901T051624Z-g3fd5adf (e469cf49-4de3-4658-8419-ab42837916ad). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the docker API. The process does not properly validate user-supplied data which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Was ZDI-CAN-3853.
help.joyent.com logo
https://help.joyent.com/hc/en-us/articles/115009649927-Security-Advisory-ZDI-CAN-3853-Docker-File-Overwrite-Vulnerability
help.joyent.com logo
https://help.joyent.com/hc/en-us/articles/115009649927-Security-Advisory-ZDI-CAN-3853-Docker-File-Overwrite-Vulnerability
securityfocus.com logo
http://www.securityfocus.com/bid/99510
+3
CVE-2014-0047
HIGH [7.8]
Last Modified: 11/21/2024
Docker before 1.5 allows local users to have unspecified impact via vectors involving unsafe /tmp usage.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1063549
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1063549
openwall.com logo
http://www.openwall.com/lists/oss-security/2015/03/24/23
+3
CVE-2017-1000094
MEDIUM [6.5]
Last Modified: 11/21/2024
Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.
jenkins.io logo
https://jenkins.io/security/advisory/2017-07-10/
jenkins.io logo
https://jenkins.io/security/advisory/2017-07-10/
CVE-2017-11468
denial of service
HIGH [7.5]
Last Modified: 11/21/2024
Docker Registry before 2.6.2 in Docker Distribution does not properly restrict the amount of content accepted from a user, which allows remote attackers to cause a denial of service (memory consumption) via the manifest endpoint.
github.com logo
https://github.com/docker/distribution/pull/2340
github.com logo
https://github.com/docker/distribution/releases/tag/v2.6.2
github.com logo
https://github.com/docker/distribution/pull/2340
+5
CVE-2017-7669
HIGH [7.5]
Last Modified: 11/21/2024
In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root.
mail-archives.apache.org logo
https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E
mail-archives.apache.org logo
https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E
securityfocus.com logo
http://www.securityfocus.com/bid/98795
+1
CVE-2016-0761
CRITICAL [9.8]
Last Modified: 11/21/2024
Cloud Foundry Garden-Linux versions prior to v0.333.0 and Elastic Runtime 1.6.x version prior to 1.6.17 contain a flaw in managing container files during Docker image preparation that could be used to delete, corrupt or overwrite host files and directories, including other container filesystems on the host.
pivotal.io logo
https://pivotal.io/security/cve-2016-0761
pivotal.io logo
https://pivotal.io/security/cve-2016-0761
CVE-2017-8928
csrf
HIGH [8.8]
Last Modified: 11/21/2024
mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF.
github.com logo
https://github.com/mailcow/mailcow-dockerized/pull/268/commits/3c937f75ba5853ada175542d5c4849fb95eb64cd
github.com logo
https://github.com/mailcow/mailcow-dockerized/pull/268/commits/3c937f75ba5853ada175542d5c4849fb95eb64cd
exploit-db.com logo
https://www.exploit-db.com/exploits/42004/
+1
CVE-2017-7412
HIGH [7.8]
Last Modified: 11/21/2024
NixOS 17.03 before 17.03.887 has a world-writable Docker socket, which allows local users to gain privileges by executing docker commands.
github.com logo
https://github.com/NixOS/nixpkgs/commit/6c59d851e2967410cc8fb6ba3f374b1d3efa988e
github.com logo
https://github.com/NixOS/nixpkgs/commit/fa4fe7110566d8370983fa81f2b04a833339236d
github.com logo
https://github.com/NixOS/nixpkgs/commit/6c59d851e2967410cc8fb6ba3f374b1d3efa988e
+3
CVE-2017-6507
MEDIUM [5.9]
Last Modified: 11/21/2024
An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
bazaar.launchpad.net logo
http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647
bazaar.launchpad.net logo
http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648
bazaar.launchpad.net logo
http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647
+7
CVE-2016-8954
CRITICAL [9.8]
Last Modified: 11/21/2024
IBM dashDB Local uses hard-coded credentials that could allow a remote attacker to gain access to the Docker container or database.
ibm.com logo
http://www.ibm.com/support/docview.wss?uid=swg21994471
ibm.com logo
http://www.ibm.com/support/docview.wss?uid=swg21994471
securityfocus.com logo
http://www.securityfocus.com/bid/95628
+1
CVE-2016-7569
directory traversal
MEDIUM [5.5]
Last Modified: 11/21/2024
Directory traversal vulnerability in docker2aci before 0.13.0 allows remote attackers to write to arbitrary files via a .. (dot dot) in the embedded layer data in an image.
github.com logo
https://github.com/appc/docker2aci/issues/201
github.com logo
https://github.com/appc/docker2aci/releases/tag/v0.13.0
github.com logo
https://github.com/appc/docker2aci/issues/201
+7
CVE-2016-6595
rce
MEDIUM [6.5]
Last Modified: 11/21/2024
The SwarmKit toolkit 1.12.0 for Docker allows remote authenticated users to cause a denial of service (prevention of cluster joins) via a long sequence of join and quit actions. NOTE: the vendor disputes this issue, stating that this sequence is not "removing the state that is left by old nodes. At some point the manager obviously stops being able to accept new nodes, since it runs out of memory. Given that both for Docker swarm and for Docker Swarmkit nodes are *required* to provide a secret token (it's actually the only mode of operation), this means that no adversary can simply join nodes and exhaust manager resources. We can't do anything about a manager running out of memory and not being able to add new legitimate nodes to the system. This is merely a resource provisioning issue, and definitely not a CVE worthy vulnerability.
openwall.com logo
http://www.openwall.com/lists/oss-security/2016/08/04/1
openwall.com logo
http://www.openwall.com/lists/oss-security/2016/09/02/1
openwall.com logo
http://www.openwall.com/lists/oss-security/2016/09/02/8
+7
CVE-2016-9223
CRITICAL [9.8]
Last Modified: 11/21/2024
A vulnerability in the Docker Engine configuration of Cisco CloudCenter Orchestrator (CCO; formerly CliQr) could allow an unauthenticated, remote attacker to install Docker containers with high privileges on the affected system. Affected Products: This vulnerability affect all releases of Cisco CloudCenter Orchestrator (CCO) deployments where the Docker Engine TCP port 2375 is open on the system and bound to local address 0.0.0.0 (any interface).
securityfocus.com logo
http://www.securityfocus.com/bid/95024
securityfocus.com logo
http://www.securityfocus.com/bid/95024
tools.cisco.com logo
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-cco
+1
CVE-2016-8867
HIGH [7.5]
Last Modified: 11/21/2024
Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.
docker.com logo
https://www.docker.com/docker-cve-database
docker.com logo
https://www.docker.com/docker-cve-database
securityfocus.com logo
http://www.securityfocus.com/bid/94228
+3
CVE-2016-8579
MEDIUM [4.0]
Last Modified: 11/21/2024
docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain.
github.com logo
https://github.com/appc/docker2aci/issues/203
github.com logo
https://github.com/appc/docker2aci/issues/203
securityfocus.com logo
http://www.securityfocus.com/bid/93560
+1
CVE-2016-3738
HIGH [8.8]
Last Modified: 11/21/2024
Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.
access.redhat.com logo
https://access.redhat.com/errata/RHSA-2016:1094
access.redhat.com logo
https://access.redhat.com/errata/RHSA-2016:1094
CVE-2016-3697
HIGH [7.8]
Last Modified: 11/21/2024
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
github.com logo
https://github.com/docker/docker/issues/21436
github.com logo
https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
github.com logo
https://github.com/opencontainers/runc/pull/708
+13
CVE-2015-3631
LOW [3.6]
Last Modified: 11/21/2024
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
+5
CVE-2015-3630
sensitive information
HIGH [7.2]
Last Modified: 11/21/2024
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
+7
CVE-2015-3629
symlink attack
HIGH [7.8]
Last Modified: 11/21/2024
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
+7
CVE-2015-3627
symlink attack
HIGH [7.2]
Last Modified: 11/21/2024
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
groups.google.com logo
https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
+5
CVE-2015-1843
MEDIUM [4.3]
Last Modified: 11/21/2024
The Red Hat docker package before 1.5.0-28, when using the --add-registry option, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. NOTE: this vulnerability exists because of a CVE-2014-5277 regression.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1206443
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1206443
rhn.redhat.com logo
http://rhn.redhat.com/errata/RHSA-2015-0776.html
+3
CVE-2014-9358
path traversal
MEDIUM [6.4]
Last Modified: 11/21/2024
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
securityfocus.com logo
http://www.securityfocus.com/archive/1/534215/100/0/threaded
+1
CVE-2014-9357
rfi
CRITICAL [10.0]
Last Modified: 11/21/2024
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
groups.google.com logo
https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
securityfocus.com logo
http://www.securityfocus.com/archive/1/534215/100/0/threaded
+1
CVE-2014-6408
MEDIUM [5.0]
Last Modified: 11/21/2024
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
docs.docker.com logo
https://docs.docker.com/v1.3/release-notes/
docs.docker.com logo
https://docs.docker.com/v1.3/release-notes/
lists.fedoraproject.org logo
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
+9
CVE-2014-6407
HIGH [7.5]
Last Modified: 11/21/2024
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
docs.docker.com logo
https://docs.docker.com/v1.3/release-notes/
docs.docker.com logo
https://docs.docker.com/v1.3/release-notes/
lists.fedoraproject.org logo
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
+9
CVE-2014-5277
MEDIUM [5.0]
Last Modified: 11/21/2024
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
groups.google.com logo
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
groups.google.com logo
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
lists.opensuse.org logo
http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html
+1
CVE-2014-3499
HIGH [7.2]
Last Modified: 11/21/2024
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1111687
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=1111687
rhn.redhat.com logo
http://rhn.redhat.com/errata/RHSA-2014-0820.html
+1