CVE-2014-9357: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
References
- www.securityfocus.com/archive/1/534215/100/0/threaded
- github.com/advisories/GHSA-997c-fj8j-rq5h
- github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2
- github.com/moby/moby/blob/master/CHANGELOG.md
- groups.google.com/forum/
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2014-9357
- web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357
Detect and mitigate CVE-2014-9357 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →