Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/60241 | third party advisory |
http://secunia.com/advisories/60171 | third party advisory |
https://docs.docker.com/v1.3/release-notes/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/24/5 | mailing list |