UBUNTU-CVE-2018-15664

Source
https://ubuntu.com/security/CVE-2018-15664
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-15664.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-15664
Related
Published
2019-05-23T00:00:00Z
Modified
2019-05-23T00:00:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

References

Affected packages

Ubuntu:16.04:LTS / docker.io

Package

Name
docker.io
Purl
pkg:deb/ubuntu/docker.io?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
18.09.7-0ubuntu1~16.04.4

Affected versions

1.*

1.6.2~dfsg1-1ubuntu4
1.10.2-0ubuntu3
1.10.2-0ubuntu4
1.10.3-0ubuntu1
1.10.3-0ubuntu4
1.10.3-0ubuntu5
1.10.3-0ubuntu6
1.11.2-0ubuntu5~16.04
1.12.1-0ubuntu13~16.04.1
1.12.3-0ubuntu4~16.04.2
1.12.6-0ubuntu1~16.04.1
1.13.1-0ubuntu1~16.04.2

17.*

17.03.2-0ubuntu2~16.04.1

18.*

18.06.1-0ubuntu1~16.04.2
18.06.1-0ubuntu1.2~16.04.1
18.09.2-0ubuntu1~16.04.1
18.09.5-0ubuntu1~16.04.2
18.09.7-0ubuntu1~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "18.09.7-0ubuntu1~16.04.4",
            "binary_name": "docker-doc"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~16.04.4",
            "binary_name": "docker.io"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~16.04.4",
            "binary_name": "golang-docker-dev"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~16.04.4",
            "binary_name": "golang-github-docker-docker-dev"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~16.04.4",
            "binary_name": "vim-syntax-docker"
        }
    ]
}

Ubuntu:18.04:LTS / docker.io

Package

Name
docker.io
Purl
pkg:deb/ubuntu/docker.io?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
18.09.7-0ubuntu1~18.04.3

Affected versions

1.*

1.13.1-0ubuntu6

17.*

17.03.2-0ubuntu1
17.03.2-0ubuntu3
17.03.2-0ubuntu5
17.12.1-0ubuntu1

18.*

18.06.1-0ubuntu1~18.04.1
18.06.1-0ubuntu1.2~18.04.1
18.09.2-0ubuntu1~18.04.1
18.09.5-0ubuntu1~18.04.2
18.09.7-0ubuntu1~18.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "18.09.7-0ubuntu1~18.04.3",
            "binary_name": "docker-doc"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~18.04.3",
            "binary_name": "docker.io"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~18.04.3",
            "binary_name": "golang-docker-dev"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~18.04.3",
            "binary_name": "golang-github-docker-docker-dev"
        },
        {
            "binary_version": "18.09.7-0ubuntu1~18.04.3",
            "binary_name": "vim-syntax-docker"
        }
    ]
}