The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHBA-2018:2796 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2482 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2729 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 | Issue Tracking Third Party Advisory |
https://github.com/moby/moby/pull/37404 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-07-06 16:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-10892
Mitre link : CVE-2018-10892
CVE.ORG link : CVE-2018-10892
JSON object : View
Products Affected
opensuse
- leap
mobyproject
- moby
redhat
- enterprise_linux_server
- openstack
- enterprise_linux
docker
- docker
CWE