Описание
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.3.0~dfsg1-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1.6.2~dfsg1-1ubuntu4~14.04.1]] |
esm-infra/xenial | not-affected | 1.3.0~dfsg1-1 |
lucid | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | not-affected | 1.6.2~dfsg1-1ubuntu4~14.04.1 |
trusty/esm | DNE | trusty was not-affected [1.6.2~dfsg1-1ubuntu4~14.04.1] |
upstream | released | 1.3.0~dfsg1-1 |
utopic | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
5.5 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
Docker before 1.3 does not properly validate image IDs, which allows r ...
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
EPSS
5.5 Medium
CVSS2
8.1 High
CVSS3