Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/docker/docker | lt | 1.3.2 |
docs.docker.com/v1.3/release-notes
github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e
lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html
lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html
nvd.nist.gov/vuln/detail/CVE-2014-6407
secunia.com/advisories/60171
secunia.com/advisories/60241
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407
www.openwall.com/lists/oss-security/2014/11/24/5