[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2NITRO-ENCLAVES-2021-003 --- docker

ID: oval:org.secpod.oval:def:1700781Date: (C)2021-12-14   (M)2023-12-20
Class: PATCHFamily: unix




Docker Engine before 18.09 allows attackers to cause a denial of service via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go. A command injection flaw was discovered in Docker during the `docker build` command. By providing a specially crafted path argument for the container to build, it is possible to inject command options to the `git fetch`/`git checkout` commands that are executed by Docker and to execute code with the privileges of the user running Docker. A local attacker who can run `docker build` with a controlled build path, or a remote attacker who has control over the docker build path, could elevate their privileges or execute code. In Docker CE and EE before 18.09.8 , Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes secrets. It potentially applies to other API users of the stack API if they resend the secret

Platform:
Amazon Linux 2
Product:
docker
Reference:
ALAS2NITRO-ENCLAVES-2021-003
CVE-2018-20699
CVE-2019-13139
CVE-2019-13509
CVE    3
CVE-2019-13139
CVE-2019-13509
CVE-2018-20699
CPE    10
cpe:/a:docker:docker:17.03.2:1:~~enterprise~~~
cpe:/a:docker:docker:17.06.2:17:~~enterprise~~~
cpe:/a:docker:docker:18.03.1:3:~~enterprise~~~
cpe:/a:docker:docker:::~~community~~~
...

© SecPod Technologies