CVE-2014-6408: Access Restriction Bypass in Docker
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81232%
CWE
Published
2/15/2022
Updated
1/9/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/docker/docker | go | >= 1.3.0, < 1.3.2 | 1.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from Docker processing security options (SecurityOpt) from image configurations (Config struct) rather than runtime configurations (HostConfig). The commit diff shows SecurityOpt
was moved from Config
to HostConfig
, and parseSecurityOpt()
was modified to accept HostConfig
. Previously, when parseSecurityOpt()
was called during container initialization (via newContainer()
) using the image's Config
, attackers could embed malicious SecurityOpt
in images. By moving SecurityOpt
handling to HostConfig
(runtime settings) and invoking parseSecurityOpt()
later in setHostConfig()
, the patch ensured security options are controlled by the user/administrator, not the image.