漏洞信息
# Docker Engine 中数据目录的权限限制不够严格
N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Insufficiently restricted permissions on data directory in Docker Engine
漏洞描述信息
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
漏洞类别
权限预留不恰当
漏洞标题
Moby 安全漏洞
漏洞描述信息
Moby是一个开源项目,旨在推动软件的容器化,并帮助生态系统使容器技术主流化。 Moby 存在安全漏洞,该漏洞源于在Moby (Docker Engine)中发现了一个bug,数据目录(通常是var lib Docker )包含的子目录权限没有受到足够的限制,允许没有特权的Linux用户遍历目录内容和执行程序。攻击者可利用该漏洞当容器包含具有扩展权限位(如setuid )的可执行程序时,没有特权的Linux用户可以发现并执行这些程序。
CVSS信息
N/A
漏洞类别
其他