In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
2021-02-02T18:15:11.827
2024-11-21T05:47:55.867
Modified
CVSSv3.1: 6.8 (MEDIUM)
AV:A/AC:L/Au:S/C:N/I:P/A:N
5.1
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | docker | docker | < 19.03.15 | Yes |
Application | docker | docker | < 20.10.3 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Application | netapp | e-series_santricity_os_controller | ≤ 11.60.3 | Yes |