Описание
Privilege Escalation in Docker
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-3499
- https://github.com/docker/docker/commit/707ef9618b3b26a0534a0af732a22f159eccfaa5
- https://bugzilla.redhat.com/show_bug.cgi?id=1111687
- https://rhn.redhat.com/errata/RHSA-2014-0820.html
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3499
- http://rhn.redhat.com/errata/RHSA-2014-0820.html
Пакеты
github.com/docker/docker
< 1.0.1
1.0.1
Связанные уязвимости
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
Docker 1.0.0 uses world-readable and world-writable permissions on the ...