Lucene search

K
archlinuxArch LinuxASA-201412-16
HistoryDec 15, 2014 - 12:00 a.m.

docker: multiple issues

2014-12-1500:00:00
Arch Linux
lists.archlinux.org
21

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

85.0%

  • CVE-2014-9356 (path traversal)
    Path traversal attacks are possible in the processing of absolute
    symlinks. In checking symlinks for traversals, only relative links were
    considered. This allowed path traversals to exist where they should have
    otherwise been prevented. This was exploitable via both archive
    extraction and through volume mounts.
    This vulnerability allowed malicious images or builds from malicious
    Dockerfiles to write files to the host system and escape
    containerization, leading to privilege escalation.

  • CVE-2014-9357 (privilege escalation)
    It has been discovered that the introduction of chroot for archive
    extraction in Docker 1.3.2 had introduced a privilege escalation
    vulnerability. Malicious images or builds from malicious Dockerfiles
    could escalate privileges and execute arbitrary code as a privileged
    root user on the Docker host by providing a malicious ‘xz’ binary.

  • CVE-2014-9358 (path traversal)
    It has been discovered that Docker does not sufficiently validate Image
    IDs as provided either via ‘docker load’ or through registry
    communications. This allows for path traversal attacks, causing graph
    corruption and manipulation by malicious images, as well as repository
    spoofing attacks.

OSVersionArchitecturePackageVersionFilename
anyanyanydocker< 1:1.4.0-1UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

85.0%