Описание
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
lucid | DNE | |
precise | DNE | |
trusty | not-affected | |
trusty/esm | DNE | trusty was not-affected |
upstream | released | 1.3.2~dfsg1-1 |
utopic | not-affected |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the defau ...
ELSA-2014-3095: docker security and bug fix update (IMPORTANT)
EPSS
5 Medium
CVSS2