Search CVE reports


Toggle filters

51 – 60 of 62 results


CVE-2014-9357

High priority
Not affected

Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-9356

High priority
Ignored

Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-8179

Low priority

Some fixes available 2 of 5

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-8178

Low priority

Some fixes available 2 of 5

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2014-6408

Medium priority
Not affected

Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-6407

Medium priority
Ignored

Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-5282

Medium priority
Ignored

Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-5278

Medium priority
Not affected

A vulnerability exists in Docker before 1.2 via container names, which may collide with and override container IDs.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io Not affected
Show less packages

CVE-2014-5277

Medium priority

Some fixes available 1 of 2

Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by...

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages

CVE-2014-3499

High priority
Ignored

Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

1 affected package

docker.io

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
docker.io
Show less packages