CVE-2021-41089 (Medium) detected in github.com/docker/docker-v20.10.7
mend-bolt-for-github opened this issue · comments
CVE-2021-41089 - Medium Severity Vulnerability
Vulnerable Library - github.com/docker/docker-v20.10.7
Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
Dependency Hierarchy:
- github.com/google/go-containerregistry-v0.6.0 (Root Library)
- github.com/docker/cli-v20.10.7
- ❌ github.com/docker/docker-v20.10.7 (Vulnerable Library)
- github.com/docker/cli-v20.10.7
Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f
Found in base branch: main
Vulnerability Details
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using docker cp
into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.
Publish Date: 2021-10-04
URL: CVE-2021-41089
CVSS 3 Score Details (6.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-v994-f8vw-g7j4
Release Date: 2021-10-04
Fix Resolution: v20.10.9
Step up your Open Source Security Game with Mend here
Stale issue message