CVE-2014-6407: Improper Link Resolution Before File Access ('Link Following')
(updated )
Docker allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
References
- docs.docker.com/v1.3/release-notes/
- github.com/advisories/GHSA-5qgp-p5jc-w2rm
- github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e
- lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html
- nvd.nist.gov/vuln/detail/CVE-2014-6407
- secunia.com/advisories/60171
- secunia.com/advisories/60241
- web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407
- www.openwall.com/lists/oss-security/2014/11/24/5
Detect and mitigate CVE-2014-6407 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →