Количество 16
Количество 16
CVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2021-21284
CVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in ...
GHSA-7452-xqpj-6rpc
moby Access to remapped root allows privilege escalation to real root
BDU:2021-01893
Уязвимость опции --userns-remap средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с некорректным ограничением имени пути к каталогу, позволяющая нарушителю оказать воздействие на целостность данных
openSUSE-SU-2021:0278-1
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
SUSE-SU-2021:0445-1
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
SUSE-SU-2021:0435-1
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork
openSUSE-SU-2021:1954-1
Security update for containerd, docker, runc
openSUSE-SU-2021:0878-1
Security update for containerd, docker, runc
SUSE-SU-2021:1954-1
Security update for containerd, docker, runc
SUSE-SU-2021:1458-1
Security update for containerd, docker, runc
SUSE-SU-2025:03545-1
Security update for docker-stable
SUSE-SU-2025:03540-1
Security update for docker-stable
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-21284 In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. | CVSS3: 6.8 | 0% Низкий | около 5 лет назад | |
CVE-2021-21284 In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. | CVSS3: 6 | 0% Низкий | около 5 лет назад | |
CVE-2021-21284 In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. | CVSS3: 6.8 | 0% Низкий | около 5 лет назад | |
CVSS3: 6.8 | 0% Низкий | больше 4 лет назад | ||
CVE-2021-21284 In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in ... | CVSS3: 6.8 | 0% Низкий | около 5 лет назад | |
GHSA-7452-xqpj-6rpc moby Access to remapped root allows privilege escalation to real root | CVSS3: 6.8 | 0% Низкий | около 2 лет назад | |
BDU:2021-01893 Уязвимость опции --userns-remap средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с некорректным ограничением имени пути к каталогу, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 6.8 | 0% Низкий | около 5 лет назад | |
openSUSE-SU-2021:0278-1 Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | почти 5 лет назад | |||
SUSE-SU-2021:0445-1 Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | почти 5 лет назад | |||
SUSE-SU-2021:0435-1 Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | почти 5 лет назад | |||
openSUSE-SU-2021:1954-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
openSUSE-SU-2021:0878-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
SUSE-SU-2021:1954-1 Security update for containerd, docker, runc | больше 4 лет назад | |||
SUSE-SU-2021:1458-1 Security update for containerd, docker, runc | почти 5 лет назад | |||
SUSE-SU-2025:03545-1 Security update for docker-stable | 4 месяца назад | |||
SUSE-SU-2025:03540-1 Security update for docker-stable | 4 месяца назад |
Уязвимостей на страницу