GHSA-g44j-7vp3-68cv

Suggest an improvement
Source
https://github.com/advisories/GHSA-g44j-7vp3-68cv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-g44j-7vp3-68cv/GHSA-g44j-7vp3-68cv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g44j-7vp3-68cv
Aliases
Published
2022-02-15T01:57:18Z
Modified
2024-08-21T15:41:38.674662Z
Severity
  • 8.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Arbitrary File Write in Libcontainer
Details

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

Database specific
{
    "nvd_published_at": "2015-05-18T15:59:15Z",
    "cwe_ids": [
        "CWE-59"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-19T22:08:41Z"
}
References

Affected packages

Go / github.com/docker/docker

Package

Name
github.com/docker/docker
View open source insights on deps.dev
Purl
pkg:golang/github.com/docker/docker

Affected ranges

Type
SEMVER
Events
Introduced
1.6.0
Fixed
1.6.1