
CVE-2016-3697 – docker: privilege escalation via confusion of usernames and UIDs
https://notcve.org/view.php?id=CVE-2016-3697
13 May 2016 — libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. libcontainer/user/user.go en runC en versiones anteriores a 0.1.0, tal como se utiliza en Docker en versiones anteriores a 1.11.2, trata indebidamente un UID numérico como un nombre de usuario potencial, lo que permite a usuarios locales obtener privilegios a través de ... • http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-3627 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3627
08 May 2015 — Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image. Libcontainer and Docker Engine anterior a 1.6.1 abre el descriptor de ficheros pasado al proceso pid-1 antes de realizar el chroot, lo que permite a usuarios locales ganar privilegios a través de una ataque de enlace simbólico en una imagen. Docker versions prior to 1.6.1 suffer from privilege escalation ... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2015-3630 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3630
08 May 2015 — Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. Docker Engine anterior a 1.6.1 utiliza permisos débiles para (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, y (4) /proc/fs, lo que permite a usuarios locales modificar el anfitrión, obtener información sensible y realizar... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-3631 – Docker Privilege Escalation / Information Disclosure
https://notcve.org/view.php?id=CVE-2015-3631
08 May 2015 — Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. Docker Engine anterior a 1.6.1 permite a usuarios locales configurar políticas arbitrarias de Linux Security Modules (LSM) y docker_t a través de una imagen que permite los volúmenes sobrepasar los ficheros en /proc. Docker versions prior to 1.6.1 suffer from privilege escalation and information disclosure vulnerabilities. • http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-1843 – docker: regression of CVE-2014-5277
https://notcve.org/view.php?id=CVE-2015-1843
02 Apr 2015 — The Red Hat docker package before 1.5.0-28, when using the --add-registry option, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. NOTE: this vulnerability exists because of a CVE-2014-5277 regression. El paquete Red Hat docker anterior a 1.5.0-28, cuando utiliza la opción --add-registry,... • http://rhn.redhat.com/errata/RHSA-2015-0776.html • CWE-20: Improper Input Validation CWE-494: Download of Code Without Integrity Check •

CVE-2014-9358 – Docker Privilege Escalation / Path Traversal / Spoofing
https://notcve.org/view.php?id=CVE-2014-9358
12 Dec 2014 — Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." Docker anterior a 1.3.3 no valida correctamente los identificadores de imágenes, lo que permite a atacantes remotos realizar ataques de salto de ruta y falsificar repositorios a través de una imagen manipulada en (1) una operación 'carga de docker' o (2) 'comunicaciones de regist... • http://www.securityfocus.com/archive/1/534215/100/0/threaded • CWE-20: Improper Input Validation •

CVE-2014-9356 – docker: Path traversal during processing of absolute symlinks
https://notcve.org/view.php?id=CVE-2014-9356
12 Dec 2014 — Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. Una vulnerabilidad de salto de ruta en Docker versiones anteriores a 1.3.3, permite a atacantes remotos escribir en archivos arbitrarios y omitir un mecanismo de protección de contenedor por medio de un nombre de ruta completo en un enlace simbólico dentro una (1) imagen o (2) compila... • http://www.securityfocus.com/archive/1/archive/1/534215/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2014-6407 – Docker Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-6407
25 Nov 2014 — Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. Docker anterior a 1.3.2 permite a atacantes remotos escribir a ficheros arbitrarios y ejecutar código arbitrario a través de un ataque de (1) enlace simbólico o (2) enlace duro en un archivo de imagen en una operación de (a) tirar o (b) cargar. Docker versions prior to 1.3.2 suffer from privilege and container es... • http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-5277 – Docker Privilege Escalation
https://notcve.org/view.php?id=CVE-2014-5277
17 Nov 2014 — Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. Docker anterior a 1.3.1 y docker-py anterior a 0.5.3 recurre a HTTP cuando la conexión HTTPS del registro falla, lo que permite a atacantes realizar ataques de man-in-the-middle y ataques de dow... • http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html • CWE-17: DEPRECATED: Code •

CVE-2014-3499 – docker: systemd socket activation results in privilege escalation
https://notcve.org/view.php?id=CVE-2014-3499
01 Jul 2014 — Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. Docker 1.0.0 utiliza permisos de lectura universal y escritura universal en el socket de gestión, lo que permite a usuarios locales ganar privilegios a través de vectores no especificados. Docker is a service providing container management on Linux. It was found that the socket used to manage the Docker service was world readable and writable. A local... • http://rhn.redhat.com/errata/RHSA-2014-0820.html • CWE-264: Permissions, Privileges, and Access Controls CWE-266: Incorrect Privilege Assignment •