CVE-2014-6408: Access Restriction Bypass in Docker
(updated )
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
References
- docs.docker.com/v1.3/release-notes/
- github.com/advisories/GHSA-44gg-pmqr-4669
- github.com/docker/docker/commit/c9379eb3fbbc484c056f5a5e49d8d0b755a29c45
- lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html
- nvd.nist.gov/vuln/detail/CVE-2014-6408
- secunia.com/advisories/60171
- secunia.com/advisories/60241
- web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6408
- www.openwall.com/lists/oss-security/2014/11/24/5
Detect and mitigate CVE-2014-6408 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →