SB2019070223 - Path traversal in docker (Alpine package)
Published: July 2, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2018-15664)
The vulnerability allows a local attacker to perform directory traversal attacks.
The vulnerability exists due to the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack. A local authenticated attacker can gain read-write access to the host filesystem with root privileges, because "daemon/archive.go" does not do archive operations on a frozen filesystem (or from within a chroot).
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=24924763d56dd80da5430746a238868ab6cc20d5
- https://git.alpinelinux.org/aports/commit/?id=00c3f0f4eb9d3c23ff8cde84d3086c07b6eb16bf
- https://git.alpinelinux.org/aports/commit/?id=7dfd1bd52137b20d92d1cab6132bdc6d3d04e013
- https://git.alpinelinux.org/aports/commit/?id=d8f7d5449b7af4d6ef496bd208602b6ffebf8383