Lucene search

K
ubuntuUbuntuUSN-5103-1
HistoryOct 04, 2021 - 12:00 a.m.

docker.io vulnerability

2021-10-0400:00:00
ubuntu.com
93

7.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.9%

Releases

  • Ubuntu 21.04
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

Details

Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in
Docker incorrectly allowed the docker cp command to make permissions
changes in the host filesystem in some situations. A local attacker
could possibly use to this to expose sensitive information or gain
administrative privileges.

OSVersionArchitecturePackageVersionFilename
Ubuntu21.04noarchdocker.io< 20.10.7-0ubuntu1~21.04.2UNKNOWN
Ubuntu21.04noarchdocker-doc< 20.10.7-0ubuntu1~21.04.2UNKNOWN
Ubuntu21.04noarchgolang-docker-dev< 20.10.7-0ubuntu1~21.04.2UNKNOWN
Ubuntu21.04noarchgolang-github-docker-docker-dev< 20.10.7-0ubuntu1~21.04.2UNKNOWN
Ubuntu21.04noarchvim-syntax-docker< 20.10.7-0ubuntu1~21.04.2UNKNOWN
Ubuntu20.04noarchdocker.io< 20.10.7-0ubuntu1~20.04.2UNKNOWN
Ubuntu20.04noarchdocker-doc< 20.10.7-0ubuntu1~20.04.2UNKNOWN
Ubuntu20.04noarchgolang-docker-dev< 20.10.7-0ubuntu1~20.04.2UNKNOWN
Ubuntu20.04noarchgolang-github-docker-docker-dev< 20.10.7-0ubuntu1~20.04.2UNKNOWN
Ubuntu20.04noarchvim-syntax-docker< 20.10.7-0ubuntu1~20.04.2UNKNOWN
Rows per page:
1-10 of 211