Описание
Arbitrary Code Execution in Docker
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-6407
- https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e
- https://docs.docker.com/v1.3/release-notes
- https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
- https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html
- https://secunia.com/advisories/60171
- https://secunia.com/advisories/60241
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407
- https://www.openwall.com/lists/oss-security/2014/11/24/5
Пакеты
github.com/docker/docker
< 1.3.2
1.3.2
Связанные уязвимости
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
Docker before 1.3.2 allows remote attackers to write to arbitrary file ...