Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-6408

Опубликовано: 24 нояб. 2014
Источник: redhat
CVSS2: 3.7

Описание

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

Отчет

This issue did not affect the version of Docker as shipped with Red Hat Enterprise Linux 7. The next current release of Docker is < 1.30 and the next release will be based off of 1.3.2 or greater.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7dockerNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1167506docker: potential container escalation

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

nvd
около 11 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

debian
около 11 лет назад

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the defau ...

github
почти 4 года назад

Access Restriction Bypass in Docker

oracle-oval
около 11 лет назад

ELSA-2014-3095: docker security and bug fix update (IMPORTANT)

3.7 Low

CVSS2