CVE-2018-10892

The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:docker:docker:*:*:*:*:community_edition:*:*:*
cpe:2.3:a:docker:docker:*:*:*:*:enterprise_edition:*:*:*
cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHBA-2018:2796 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2018:2796 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2482 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2482 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 - Issue Tracking, Third Party Advisory
References () https://github.com/moby/moby/pull/37404 - Third Party Advisory () https://github.com/moby/moby/pull/37404 - Third Party Advisory

Information

Published : 2018-07-06 16:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10892

Mitre link : CVE-2018-10892

CVE.ORG link : CVE-2018-10892


JSON object : View

Products Affected

docker

  • docker

mobyproject

  • moby

redhat

  • enterprise_linux_server
  • enterprise_linux
  • openstack

opensuse

  • leap
CWE
CWE-250

Execution with Unnecessary Privileges

NVD-CWE-Other