Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Docker | Docker | * | 1.3.1 (including) |
| Docker | Docker | 1.0.0 (including) | 1.0.0 (including) |
| Docker | Docker | 1.3.0 (including) | 1.3.0 (including) |
| Red Hat Enterprise Linux 7 Extras | RedHat | docker-0:1.3.2-4.el7 | * |
| Docker.io | Ubuntu | upstream | * |
| Docker.io | Ubuntu | utopic | * |