Описание
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.13.1-0ubuntu4 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
esm-infra/xenial | released | 1.10.3-0ubuntu6 |
precise | DNE | |
precise/esm | DNE | |
trusty | not-affected | code not present |
trusty/esm | DNE | trusty was not-affected [code not present] |
upstream | released | 1.8.3 |
vivid | ignored | end of life |
vivid/stable-phone-overlay | DNE |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does ...
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3