CVE-2016-8867

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-8867
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8867.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-8867
Related
Withdrawn
2024-05-15T05:32:21.573102Z
Published
2016-10-28T15:59:14Z
Modified
2023-11-29T05:49:30.944638Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.

References

Affected packages

Git / github.com/docker/docker

Affected ranges

Type
GIT
Repo
https://github.com/docker/docker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/docker/engine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.0.3

Other

autorun/1

upstream/0.*

upstream/0.1.1
upstream/0.1.2
upstream/0.1.3
upstream/0.1.4

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.10.0
v0.11.0
v0.11.1
v0.12.0
v0.2.0
v0.2.1
v0.2.2
v0.3.0
v0.3.1
v0.3.2
v0.3.3
v0.3.4
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.6.6
v0.6.7
v0.7.0
v0.7.0-rc5
v0.7.0-rc6
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.8.0
v0.8.1
v0.9.0

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.12.0
v1.12.0-rc1
v1.12.0-rc2
v1.12.0-rc3
v1.12.0-rc4
v1.12.0-rc5
v1.12.1
v1.12.1-rc1
v1.12.1-rc2
v1.12.2
v1.12.2-rc1
v1.12.2-rc2
v1.12.2-rc3
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1