Privilege Escalation Affecting github.com/moby/moby Open this link in a new tab package, versions <19.3.15 >=20.10.0-beta1 <20.10.3
Attack Complexity
High
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMMOBYMOBY-1069900
-
published
4 Feb 2021
-
disclosed
3 Feb 2021
-
credit
Alex Chapman, Alex Price, Nathan Burrell, Raúl Gomis, Chris Walz, Mark Adams, David Black, Brian Goff
Introduced: 3 Feb 2021
CVE-2021-21284 Open this link in a new tabHow to fix?
Upgrade github.com/moby/moby
to version 19.3.15, 20.10.3 or higher.
Overview
Affected versions of this package are vulnerable to Privilege Escalation. There is a vulnerability in Docker involving the --userns-remap
option in which access to remapped root allows privilege escalation to real root. When using --userns-remap
, if the root user in the remapped namespace has access to the host filesystem they can modify files under /var/lib/docker/<remapping>
that cause writing files with extended privileges.