VYPR

rpm package

suse/docker&distro=SUSE Linux Enterprise Module for Containers 12

pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012

Vulnerabilities (49)

  • CVE-2018-16874Dec 14, 2018
    affected < 18.09.1_ce-98.34.2fixed 18.09.1_ce-98.34.2

    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but

  • CVE-2018-16873Dec 14, 2018
    affected < 18.09.1_ce-98.34.2fixed 18.09.1_ce-98.34.2

    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPA

  • CVE-2018-10892Jul 6, 2018
    affected < 19.03.1_ce-98.46.1fixed 19.03.1_ce-98.46.1

    The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.

  • CVE-2017-16539MedNov 4, 2017
    affected < 17.09.1_ce-98.8.1fixed 17.09.1_ce-98.8.1

    The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-dev

  • CVE-2017-14992MedNov 1, 2017
    affected < 17.09.1_ce-98.8.1fixed 17.09.1_ce-98.8.1

    Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.

  • CVE-2017-8932MedJul 6, 2017
    affected < 17.04.0_ce-98.2fixed 17.04.0_ce-98.2

    A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input

  • CVE-2016-9962MedJan 31, 2017
    affected < 1.12.6-87.2fixed 1.12.6-87.2

    RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to conta

  • CVE-2016-8867HigOct 28, 2016
    affected < 1.12.3-81.2fixed 1.12.3-81.2

    Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.

  • CVE-2016-3697HigJun 1, 2016
    affected < 1.10.3-66.1fixed 1.10.3-66.1

    libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

Page 3 of 3