Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/docker/docker(Go) | 0 | 1.3.3 | N/A |
CVSS Metrics