-
CVSS Score
-The vulnerability stemmed from Docker's 'cp' command processing archives in a chroot environment. The patch added an init() function in pkg/chrootarchive/archive.go to preload nss libraries (user.Lookup and net.LookupHost) in the host environment. This indicates the vulnerable code path was the chrooted archive operations (like Untar) that previously allowed container-controlled nsswitch.conf to trigger dynamic library loading from the chroot. The Untar function would execute within the container's chroot context, making it the entry point for the insecure library loading before the patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/docker/docker | go | >= 19.03.0, < 19.03.1 | 19.03.1 |
A Semantic Attack on Google Gemini - Read the Latest Research