Description
In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend.
As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default.
No analysis available yet.
Remediation
Vendor Workaround
Disable Docker Extensions or enable "Allow only extensions distributed through the Docker Marketplace" from the Settings panel.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47355 | In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop v4.31.0 https://docs.docker.com/desktop/release-notes/#4310 additionally changes the default configuration to enable this setting by default. |
References
| Link | Providers |
|---|---|
| https://docs.docker.com/desktop/release-notes/#4290 |
|
History
No history.
Status: PUBLISHED
Assigner: Docker
Published:
Updated: 2024-08-01T21:33:05.292Z
Reserved: 2024-06-20T18:47:44.854Z
Link: CVE-2024-6222
Updated: 2024-08-01T21:33:05.292Z
Status : Modified
Published: 2024-07-09T18:15:12.510
Modified: 2024-11-21T09:49:13.597
Link: CVE-2024-6222
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD