The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
References
Link | Resource |
---|---|
https://github.com/moby/moby/pull/37404 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2482 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2729 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHBA-2018:2796 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-07-06 09:29
Updated : 2023-02-12 15:31
NVD link : CVE-2018-10892
Mitre link : CVE-2018-10892
JSON object : View
CWE
CWE-250
Execution with Unnecessary Privileges
Products Affected
docker
- docker
redhat
- enterprise_linux
- openstack
- enterprise_linux_server
mobyproject
- moby
opensuse
- leap