Headline
GHSA-7452-xqpj-6rpc: moby Access to remapped root allows privilege escalation to real root
Impact
When using --userns-remap
, if the root user in the remapped namespace has access to the host filesystem they can modify files under /var/lib/docker/<remapping>
that cause writing files with extended privileges.
Patches
Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
Credits
Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @bassmatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to [email protected]
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2021-21284
moby Access to remapped root allows privilege escalation to real root
Moderate severity GitHub Reviewed Published Feb 2, 2021 in moby/moby • Updated Jan 31, 2024
Package
gomod github.com/moby/moby (Go)
Affected versions
< 19.3.15
>= 20.10.0-beta1, < 20.10.3
Patched versions
19.3.15
20.10.3
Description
Published to the GitHub Advisory Database
Jan 31, 2024
Last updated
Jan 31, 2024
Related news
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.