Read Next
Mix
June 30, 2025
What the NULL?! Wing FTP Server RCE (CVE-2025-47812)
Mix
June 26, 2025
The Rise of AI-Driven API Vulnerabilities
Mix
June 26, 2025
Dumping Cursor for VSCode + Claude Code
Mix
June 24, 2025
Understanding DevSecOps | HAHWUL
Mix
June 24, 2025
what’s best for your business?
Mix
June 23, 2025
How to Securing GraphQL | HAHWUL
Mix
June 23, 2025
How to Securing SSE | HAHWUL
July 3, 2025
What CISA’s BOD 25-01 Means for API Security and How Wallarm Can Help
July 1, 2025
Why Prompt Engineering and Context Engineering Both Miss the Point
June 30, 2025
What the NULL?! Wing FTP Server RCE (CVE-2025-47812)
June 26, 2025
[tl;dr sec] #285 – AI Red Teaming, Detection Engineering Field Manual, Building AppSec Partnerships
June 26, 2025
The Rise of AI-Driven API Vulnerabilities
June 26, 2025
Dumping Cursor for VSCode + Claude Code
June 24, 2025
Understanding DevSecOps | HAHWUL
June 24, 2025
what’s best for your business?
June 23, 2025
How to Securing GraphQL | HAHWUL
June 23, 2025
Impact
When using
--userns-remap
, if the root user in the remapped namespace has access to the host filesystem they can modify files under/var/lib/docker/
that cause writing files with extended privileges.Patches
Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
Credits
Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @BassMatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to [email protected]