CVE-2024-6222

In Docker Desktop before v4.29.0, an attacker who has gained access to the Docker Desktop VM through a container breakout can further escape to the host by passing extensions and dashboard related IPC messages. Docker Desktop v4.29.0 https://docs.docker.com/desktop/release-notes/#4290 fixes the issue on MacOS, Linux and Windows with Hyper-V backend. As exploitation requires "Allow only extensions distributed through the Docker Marketplace" to be disabled, Docker Desktop  v4.31.0 https://docs.docker.com/desktop/release-notes/#4310  additionally changes the default configuration to enable this setting by default.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:docker:desktop:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-07-09 18:15

Updated : 2024-07-12 17:05


NVD link : CVE-2024-6222

Mitre link : CVE-2024-6222

CVE.ORG link : CVE-2024-6222


JSON object : View

Products Affected

docker

  • desktop

linux

  • linux_kernel

apple

  • macos

microsoft

  • windows
CWE
NVD-CWE-noinfo CWE-923

Improper Restriction of Communication Channel to Intended Endpoints