CVE-2018-10892
Severity
5.3MEDIUM
EPSS
0.1%
top 70.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 6
Latest updateMay 13
Description
The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages7 packages
Also affects: Enterprise Linux 7.0
🔴Vulnerability Details
3📋Vendor Advisories
2💬Community
8Bugzilla▶
CVE-2018-10892 podman: docker: container breakout without selinux in enforcing mode [fedora-all]↗2018-07-09
Bugzilla▶
CVE-2018-10892 cri-o: docker: container breakout without selinux in enforcing mode [fedora-all]↗2018-07-09
Bugzilla▶
CVE-2018-10892 podman: docker: container breakout without selinux in enforcing mode [fedora-all]↗2018-07-09
Bugzilla▶
CVE-2018-10892 cri-o: docker: container breakout without selinux in enforcing mode [fedora-all]↗2018-07-09