Source: docker.io Version: 18.09.1+dfsg1-7 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://github.com/docker/docker/pull/39252 Control: found -1 18.09.1+dfsg1-7~deb10u1 Control: found -1 18.09.5+dfsg1-1
Hi, The following vulnerability was published for docker.io. CVE-2018-15664[0]: | In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker | cp' command are vulnerable to a symlink-exchange attack with Directory | Traversal, giving attackers arbitrary read-write access to the host | filesystem with root privileges, because daemon/archive.go does not do | archive operations on a frozen filesystem (or from within a chroot). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-15664 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15664 [1] https://github.com/docker/docker/pull/39252 [2] https://www.openwall.com/lists/oss-security/2019/05/28/1 Please adjust the affected versions in the BTS as needed. Regards, Salvatore