[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1316 --- docker

ID: oval:org.secpod.oval:def:1601101Date: (C)2020-01-25   (M)2024-06-03
Class: PATCHFamily: unix




A command injection flaw was discovered in Docker during the `docker build` command. By providing a specially crafted path argument for the container to build, it is possible to inject command options to the `git fetch`/`git checkout` commands that are executed by Docker and to execute code with the privileges of the user running Docker. A local attacker who can run `docker build` with a controlled build path, or a remote attacker who has control over the docker build path, could elevate their privileges or execute code.In Docker CE and EE before 18.09.8 , Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes secrets. It potentially applies to other API users of the stack API if they resend the secret.

Platform:
Amazon Linux AMI
Product:
docker
Reference:
ALAS-2019-1316
CVE-2019-13509
CVE-2019-13139
CVE    2
CVE-2019-13509
CVE-2019-13139

© SecPod Technologies