The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHBA-2018:2796 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2482 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2729 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 | Issue Tracking Third Party Advisory |
https://github.com/moby/moby/pull/37404 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHBA-2018:2796 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2482 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2729 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 | Issue Tracking Third Party Advisory |
https://github.com/moby/moby/pull/37404 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHBA-2018:2796 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2482 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2729 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/moby/moby/pull/37404 - Third Party Advisory |
Information
Published : 2018-07-06 16:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10892
Mitre link : CVE-2018-10892
CVE.ORG link : CVE-2018-10892
JSON object : View
Products Affected
docker
- docker
mobyproject
- moby
redhat
- enterprise_linux_server
- enterprise_linux
- openstack
opensuse
- leap
CWE