Количество 15
Количество 15
CVE-2021-41091
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to hos...
CVE-2021-41091
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to hos...
CVE-2021-41091
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host v
CVE-2021-41091
Moby is an open-source project created by Docker to enable software co ...
GHSA-3fwx-pjgw-3558
Moby (Docker Engine) Insufficiently restricted permissions on data directory
BDU:2023-07629
Уязвимость средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с неправильным сохранением разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
openSUSE-SU-2022:0334-1
Security update for containerd, docker
SUSE-SU-2022:0334-1
Security update for containerd, docker
SUSE-SU-2022:0213-1
Security update for containerd, docker
openSUSE-SU-2021:3506-1
Security update for containerd, docker, runc
openSUSE-SU-2021:1404-1
Security update for containerd, docker, runc
SUSE-SU-2021:3506-1
Security update for containerd, docker, runc
SUSE-SU-2021:3336-1
Security update for containerd, docker, runc
SUSE-SU-2025:03545-1
Security update for docker-stable
SUSE-SU-2025:03540-1
Security update for docker-stable
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-41091 Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to hos... | CVSS3: 6.3 | 5% Низкий | больше 4 лет назад | |
CVE-2021-41091 Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to hos... | CVSS3: 6.3 | 5% Низкий | больше 4 лет назад | |
CVE-2021-41091 Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host v | CVSS3: 6.3 | 5% Низкий | больше 4 лет назад | |
CVE-2021-41091 Moby is an open-source project created by Docker to enable software co ... | CVSS3: 6.3 | 5% Низкий | больше 4 лет назад | |
GHSA-3fwx-pjgw-3558 Moby (Docker Engine) Insufficiently restricted permissions on data directory | CVSS3: 5.9 | 5% Низкий | около 2 лет назад | |
BDU:2023-07629 Уязвимость средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с неправильным сохранением разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 6.3 | 5% Низкий | больше 4 лет назад | |
openSUSE-SU-2022:0334-1 Security update for containerd, docker | около 4 лет назад | |||
SUSE-SU-2022:0334-1 Security update for containerd, docker | около 4 лет назад | |||
SUSE-SU-2022:0213-1 Security update for containerd, docker | около 4 лет назад | |||
openSUSE-SU-2021:3506-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
openSUSE-SU-2021:1404-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
SUSE-SU-2021:3506-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
SUSE-SU-2021:3336-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
SUSE-SU-2025:03545-1 Security update for docker-stable | 4 месяца назад | |||
SUSE-SU-2025:03540-1 Security update for docker-stable | 4 месяца назад |
Уязвимостей на страницу