In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
References
Link | Resource |
---|---|
https://docs.docker.com/desktop/release-notes/#4290 | Release Notes |
https://docs.docker.com/desktop/release-notes/#4290 | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.docker.com/desktop/release-notes/#4290 - Release Notes |
12 Jul 2024, 17:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Docker
Apple Linux Apple macos Linux linux Kernel Docker desktop Microsoft Microsoft windows |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
References | () https://docs.docker.com/desktop/release-notes/#4290 - Release Notes | |
Summary |
|
|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:* |
09 Jul 2024, 18:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 18:15
Updated : 2024-11-21 09:49
NVD link : CVE-2024-6222
Mitre link : CVE-2024-6222
CVE.ORG link : CVE-2024-6222
JSON object : View
Products Affected
docker
- desktop
apple
- macos
linux
- linux_kernel
microsoft
- windows
CWE