High severityNVD Advisory· Published Dec 16, 2014· Updated May 6, 2026
CVE-2014-9357
CVE-2014-9357
Description
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/docker/dockerGo | < 1.3.3 | 1.3.3 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-997c-fj8j-rq5hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-9357ghsaADVISORY
- www.securityfocus.com/archive/1/534215/100/0/threadednvdWEB
- github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2ghsaWEB
- github.com/moby/moby/blob/master/CHANGELOG.mdghsaWEB
- groups.google.com/forum/ghsaWEB
- groups.google.com/forum/nvdWEB
- web.nvd.nist.gov/view/vuln/detailghsaWEB
News mentions
0No linked articles in our index yet.