blob: 098c7a914146fbce72f0ab69c6f75bd53022c164 [file] [log] [blame]
id: GO-2024-2521
modules:
- module: github.com/docker/docker
versions:
- fixed: 20.10.0-beta1+incompatible
non_go_versions:
- introduced: 19.03.0
- fixed: 19.03.1
packages:
- package: github.com/docker/docker/pkg/chrootarchive
skip_fix: fix does not work with incompatible versions
- module: github.com/moby/moby
versions:
- fixed: 20.10.0-beta1+incompatible
non_go_versions:
- introduced: 19.03.0
- fixed: 19.03.1
packages:
- package: github.com/moby/moby/pkg/chrootarchive
skip_fix: fix does not work with incompatible versions
summary: Moby Docker cp broken with debian containers in github.com/docker/docker
description: |-
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc),
code injection can occur when the nsswitch facility dynamically loads a library
inside a chroot that contains the contents of the container.
cves:
- CVE-2019-14271
ghsas:
- GHSA-v2cv-wwxq-qq97
references:
- advisory: https://github.com/advisories/GHSA-v2cv-wwxq-qq97
- fix: https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545
- fix: https://github.com/moby/moby/commit/fa8dd90ceb7bcb9d554d27e0b9087ab83e54bd2b
- fix: https://github.com/moby/moby/pull/39612
- report: https://github.com/moby/moby/issues/39449
source:
id: GHSA-v2cv-wwxq-qq97
created: 2024-07-15T12:29:37.368794-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE