Description: In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the –userns-remap option in which access to remapped root allows privilege escalation to real root. When using “–userns-remap”, if the root user in the remapped namespace has access to the host filesystem they can modify files under “/var/lib/docker/
CVE-2021-21284
CVSS Score: 6.8 (MEDIUM)
EPSS Score: 0.05%
Risk Score: 4.76 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
Mitre ATT&CK Technical v15.1
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c
https://docs.docker.com/engine/release-notes/#20103
https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc
https://github.com/moby/moby/releases/tag/v19.03.15
https://github.com/moby/moby/releases/tag/v20.10.3
https://security.netapp.com/advisory/ntap-20210226-0005/
https://www.debian.org/security/2021/dsa-4865
https://security.gentoo.org/glsa/202107-23
Vendor - Produce - Version
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.