Related Vulnerabilities: CVE-2021-21284  

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

Severity Low

Remote No

Type Privilege escalation

Description

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

AVG-1528 docker 1:20.10.2-4 1:20.10.3-1 Medium Fixed

https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc
https://github.com/moby/moby/commit/edb62a3ace8c4303822a391b38231e577f8c2ee8
https://github.com/moby/moby/commit/bfedd2725971303efb7a2fe5d6990317b381622f
https://github.com/moby/moby/commit/e908cc39018c015084ffbffbc5703ccba5c2fbb7