In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://docs.docker.com/desktop/release-notes/#4290 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: Docker
Published: 2024-07-09T17:16:05.646Z
Updated: 2024-08-01T21:33:05.292Z
Reserved: 2024-06-20T18:47:44.854Z
Link: CVE-2024-6222
Vulnrichment
Updated: 2024-08-01T21:33:05.292Z
NVD
Status : Analyzed
Published: 2024-07-09T18:15:12.510
Modified: 2024-07-12T17:05:39.070
Link: CVE-2024-6222
Redhat
No data.