github.com/docker/docker is vulnerable to path traversal attacks and spoofed repositories. These attacks are possible because Docker fails to correctly validate image IDs when using docker load
or register communications.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/docker/docker | eq | HEAD | |
github.com/docker/docker | le | 1.3.2 |
www.securityfocus.com/archive/1/534215/100/0/threaded
www.securityfocus.com/archive/1/534215/100/0/threaded
github.com/docker/docker/commit/acf1720b3f6035f0ab2c9658371ae8302851ffa3
groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ
groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ