CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2014-8178 – SUSE Security Advisory - SUSE-SU-2015:1757-1
https://notcve.org/view.php?id=CVE-2014-8178
14 Oct 2015 — Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands. Docker Engine versiones anteriores a la versión 1.8.3 y CS Docker Engine versiones anteriores a la versión 1.6.2-CS7, no utilizan un identificador único de forma global para almacenar capas de imágenes, lo que facilita a atacantes envenenar la caché de imágenes por medio de u... • http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html • CWE-20: Improper Input Validation •
CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0CVE-2014-8179 – SUSE Security Advisory - SUSE-SU-2015:1757-1
https://notcve.org/view.php?id=CVE-2014-8179
14 Oct 2015 — Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation. Docker Engine versiones anteriores a la versión 1.8.3 y CS Docker Engine versiones anteriores a la versión 1.6.2-CS7 no comprueba y extrae apropiadamente el objeto manifiesto desde su representación JSON durante una extracción, lo que permit... • http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html • CWE-20: Improper Input Validation •
CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0CVE-2015-3630 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3630
08 May 2015 — Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. Docker Engine anterior a 1.6.1 utiliza permisos débiles para (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, y (4) /proc/fs, lo que permite a usuarios locales modificar el anfitrión, obtener información sensible y realizar... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-264: Permissions, Privileges, and Access Controls •
CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0CVE-2015-3631 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3631
08 May 2015 — Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. Docker Engine anterior a 1.6.1 permite a usuarios locales configurar políticas arbitrarias de Linux Security Modules (LSM) y docker_t a través de una imagen que permite los volúmenes sobrepasar los ficheros en /proc. These are all security issues fixed in the docker-stable-24.0.9_ce-15.1 package on the GA media of openSUSE Tumbleweed. • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-264: Permissions, Privileges, and Access Controls •
CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 0CVE-2015-3627 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3627
08 May 2015 — Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image. Libcontainer and Docker Engine anterior a 1.6.1 abre el descriptor de ficheros pasado al proceso pid-1 antes de realizar el chroot, lo que permite a usuarios locales ganar privilegios a través de una ataque de enlace simbólico en una imagen. These are all security issues fixed in the docker-stable-24.0.9_... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVSS: 7.4EPSS: 1%CPEs: 1EXPL: 0CVE-2015-1843 – docker: regression of CVE-2014-5277
https://notcve.org/view.php?id=CVE-2015-1843
02 Apr 2015 — The Red Hat docker package before 1.5.0-28, when using the --add-registry option, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. NOTE: this vulnerability exists because of a CVE-2014-5277 regression. El paquete Red Hat docker anterior a 1.5.0-28, cuando utiliza la opción --add-registry,... • http://rhn.redhat.com/errata/RHSA-2015-0776.html • CWE-20: Improper Input Validation CWE-494: Download of Code Without Integrity Check •
CVSS: 8.6EPSS: 1%CPEs: 1EXPL: 0CVE-2014-9356 – docker: Path traversal during processing of absolute symlinks
https://notcve.org/view.php?id=CVE-2014-9356
12 Dec 2014 — Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. Una vulnerabilidad de salto de ruta en Docker versiones anteriores a 1.3.3, permite a atacantes remotos escribir en archivos arbitrarios y omitir un mecanismo de protección de contenedor por medio de un nombre de ruta completo en un enlace simbólico dentro una (1) imagen o (2) compila... • http://www.securityfocus.com/archive/1/archive/1/534215/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0CVE-2014-9358 – Docker Privilege Escalation / Path Traversal / Spoofing
https://notcve.org/view.php?id=CVE-2014-9358
12 Dec 2014 — Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." Docker anterior a 1.3.3 no valida correctamente los identificadores de imágenes, lo que permite a atacantes remotos realizar ataques de salto de ruta y falsificar repositorios a través de una imagen manipulada en (1) una operación 'carga de docker' o (2) 'comunicaciones de regist... • http://www.securityfocus.com/archive/1/534215/100/0/threaded • CWE-20: Improper Input Validation •
CVSS: 10.0EPSS: 53%CPEs: 1EXPL: 0CVE-2014-9357 – docker: Escalation of privileges during decompression of LZMA archives
https://notcve.org/view.php?id=CVE-2014-9357
12 Dec 2014 — Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. Docker 1.3.2 permite a atacantes remotos ejecutar código arbitrario con privilegios root a través de (1) una imagen manipulada o (2) un build manipulado en in fichero Docker en un archivo LZMA (.xz), relacionado con el chroot para la extracción de archivos. A flaw was found in the way the Docker servic... • http://www.securityfocus.com/archive/1/534215/100/0/threaded • CWE-264: Permissions, Privileges, and Access Controls •
CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 0CVE-2014-6407 – Docker Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-6407
25 Nov 2014 — Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. Docker anterior a 1.3.2 permite a atacantes remotos escribir a ficheros arbitrarios y ejecutar código arbitrario a través de un ataque de (1) enlace simbólico o (2) enlace duro en un archivo de imagen en una operación de (a) tirar o (b) cargar. These are all security issues fixed in the docker-stable-24.0.9_ce-15... • http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
