First published: Mon Jul 29 2019(Updated: )
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | >=19.03<19.03.1 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
debian/docker.io | 18.09.1+dfsg1-7.1+deb10u3 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 20.10.25+dfsg1-2 | |
go/github.com/docker/docker | >=19.03.0<19.03.1 | 19.03.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14271 is a vulnerability in Docker 19.03.x that allows code injection when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Docker versions 19.03.x before 19.03.1, Debian Linux 10.0, openSUSE Leap 15.0 and 15.1 are affected by CVE-2019-14271.
CVE-2019-14271 has a severity rating of 9.8 (critical).
To fix CVE-2019-14271, update Docker to version 19.03.1 or newer.
You can find more information about CVE-2019-14271 at the following references: - [GitHub Issue](https://github.com/moby/moby/issues/39449) - [GitHub Pull Request](https://github.com/moby/moby/pull/39612) - [Docker Engine Pull Request](https://github.com/docker/engine/pull/305)