Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-9357
Vulnerability from cvelistv5
Published
2014-12-16 18:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:25.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9357", "datePublished": "2014-12-16T18:00:00", "dateReserved": "2014-12-09T00:00:00", "dateUpdated": "2024-08-06T13:40:25.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B6B6AB7-1ABB-4CD7-9C34-621263595589\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.\"}, {\"lang\": \"es\", \"value\": \"Docker 1.3.2 permite a atacantes remotos ejecutar c\\u00f3digo arbitrario con privilegios root a trav\\u00e9s de (1) una imagen manipulada o (2) un build manipulado en in fichero Docker en un archivo LZMA (.xz), relacionado con el chroot para la extracci\\u00f3n de archivos.\"}]", "id": "CVE-2014-9357", "lastModified": "2024-11-21T02:20:41.767", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-12-16T18:59:15.950", "references": "[{\"url\": \"http://www.securityfocus.com/archive/1/534215/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/534215/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2014-9357\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-12-16T18:59:15.950\",\"lastModified\":\"2024-11-21T02:20:41.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.\"},{\"lang\":\"es\",\"value\":\"Docker 1.3.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios root a trav\u00e9s de (1) una imagen manipulada o (2) un build manipulado en in fichero Docker en un archivo LZMA (.xz), relacionado con el chroot para la extracci\u00f3n de archivos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6B6AB7-1ABB-4CD7-9C34-621263595589\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/archive/1/534215/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/534215/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2015:0623
Vulnerability from csaf_redhat
Published
2015-03-05 03:18
Modified
2024-11-22 08:47
Summary
Red Hat Security Advisory: docker security, bug fix, and enhancement update
Notes
Topic
Updated docker packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 7
Extras.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Docker is a service providing container management on Linux.
It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)
A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)
Red Hat would like to thank Docker Inc. for reporting these issues.
The docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.
The docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)
Bug fixes:
* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the "docker inspect" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from "docker inspect" is now uniform. (BZ#1092773)
* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)
* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing "docker run" failed to create containers. This update fixes the default path to the secrets directory and "docker run" now executes successfully. (BZ#1102568)
* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)
* When executing the "docker attach" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running "docker attach" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)
* The "docker run" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of "docker run" impossible. This update fixes the inconsistencies within the exit codes of "docker run". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)
* Adding a new registry with the "--registry-prepend" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The "--registry-prepend" option has been renamed to "--registry-add" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)
All docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated docker packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 7\nExtras.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Docker is a service providing container management on Linux.\n\nIt was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)\n\nA flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)\n\nRed Hat would like to thank Docker Inc. for reporting these issues.\n\nThe docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.\n\nThe docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)\n\nBug fixes:\n\n* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the \"docker inspect\" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from \"docker inspect\" is now uniform. (BZ#1092773)\n\n* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)\n\n* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing \"docker run\" failed to create containers. This update fixes the default path to the secrets directory and \"docker run\" now executes successfully. (BZ#1102568)\n\n* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)\n\n* When executing the \"docker attach\" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running \"docker attach\" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)\n\n* The \"docker run\" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of \"docker run\" impossible. This update fixes the inconsistencies within the exit codes of \"docker run\". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)\n\n* Adding a new registry with the \"--registry-prepend\" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The \"--registry-prepend\" option has been renamed to \"--registry-add\" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)\n\nAll docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0623", "url": "https://access.redhat.com/errata/RHSA-2015:0623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1092773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092773" }, { "category": "external", "summary": "1100009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1100009" }, { "category": "external", "summary": "1102568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102568" }, { "category": "external", "summary": "1113608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113608" }, { "category": "external", "summary": "1162807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162807" }, { "category": "external", "summary": "1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "1174351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174351" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0623.json" } ], "title": "Red Hat Security Advisory: docker security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:47:54+00:00", "generator": { "date": "2024-11-22T08:47:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0623", "initial_release_date": "2015-03-05T03:18:20+00:00", "revision_history": [ { "date": "2015-03-05T03:18:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-03-05T10:28:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:47:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_id": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-websocket-client@0.14.1-37.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.src", "product": { "name": "docker-0:1.4.1-37.el7.src", "product_id": "docker-0:1.4.1-37.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-0:1.4.1-37.el7.x86_64", "product_id": "docker-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-python-0:0.7.1-37.el7.x86_64", "product": { "name": "docker-python-0:0.7.1-37.el7.x86_64", "product_id": "docker-python-0:0.7.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-python@0.7.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_id": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-logrotate@1.4.1-37.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.src" }, "product_reference": "docker-0:1.4.1-37.el7.src", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-logrotate-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-python-0:0.7.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64" }, "product_reference": "docker-python-0:0.7.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" }, "product_reference": "python-websocket-client-0:0.14.1-37.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Docker Inc." ] } ], "cve": "CVE-2014-9356", "discovery_date": "2014-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172761" } ], "notes": [ { "category": "description", "text": "It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Path traversal during processing of absolute symlinks", "title": "Vulnerability summary" }, { "category": "other", "text": "* This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\n* Red Hat does not support or recommend running untrusted images.\n\n* In Red Hat OpenStack Platform, because the flaw\u0027s impact is low and docker is not directly used by the director-operator, no update will be provided at this time for the operator containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9356" }, { "category": "external", "summary": "RHBZ#1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9356", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Path traversal during processing of absolute symlinks" }, { "cve": "CVE-2014-9357", "discovery_date": "2014-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172782" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Escalation of privileges during decompression of LZMA archives", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\nRed Hat does not support or recommend running untrusted images.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9357" }, { "category": "external", "summary": "RHBZ#1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9357", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9357" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Escalation of privileges during decompression of LZMA archives" } ] }
rhsa-2015_0623
Vulnerability from csaf_redhat
Published
2015-03-05 03:18
Modified
2024-11-22 08:47
Summary
Red Hat Security Advisory: docker security, bug fix, and enhancement update
Notes
Topic
Updated docker packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 7
Extras.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Docker is a service providing container management on Linux.
It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)
A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)
Red Hat would like to thank Docker Inc. for reporting these issues.
The docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.
The docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)
Bug fixes:
* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the "docker inspect" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from "docker inspect" is now uniform. (BZ#1092773)
* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)
* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing "docker run" failed to create containers. This update fixes the default path to the secrets directory and "docker run" now executes successfully. (BZ#1102568)
* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)
* When executing the "docker attach" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running "docker attach" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)
* The "docker run" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of "docker run" impossible. This update fixes the inconsistencies within the exit codes of "docker run". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)
* Adding a new registry with the "--registry-prepend" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The "--registry-prepend" option has been renamed to "--registry-add" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)
All docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated docker packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 7\nExtras.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Docker is a service providing container management on Linux.\n\nIt was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)\n\nA flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)\n\nRed Hat would like to thank Docker Inc. for reporting these issues.\n\nThe docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.\n\nThe docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)\n\nBug fixes:\n\n* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the \"docker inspect\" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from \"docker inspect\" is now uniform. (BZ#1092773)\n\n* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)\n\n* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing \"docker run\" failed to create containers. This update fixes the default path to the secrets directory and \"docker run\" now executes successfully. (BZ#1102568)\n\n* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)\n\n* When executing the \"docker attach\" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running \"docker attach\" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)\n\n* The \"docker run\" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of \"docker run\" impossible. This update fixes the inconsistencies within the exit codes of \"docker run\". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)\n\n* Adding a new registry with the \"--registry-prepend\" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The \"--registry-prepend\" option has been renamed to \"--registry-add\" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)\n\nAll docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0623", "url": "https://access.redhat.com/errata/RHSA-2015:0623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1092773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092773" }, { "category": "external", "summary": "1100009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1100009" }, { "category": "external", "summary": "1102568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102568" }, { "category": "external", "summary": "1113608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113608" }, { "category": "external", "summary": "1162807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162807" }, { "category": "external", "summary": "1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "1174351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174351" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0623.json" } ], "title": "Red Hat Security Advisory: docker security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:47:54+00:00", "generator": { "date": "2024-11-22T08:47:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0623", "initial_release_date": "2015-03-05T03:18:20+00:00", "revision_history": [ { "date": "2015-03-05T03:18:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-03-05T10:28:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:47:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_id": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-websocket-client@0.14.1-37.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.src", "product": { "name": "docker-0:1.4.1-37.el7.src", "product_id": "docker-0:1.4.1-37.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-0:1.4.1-37.el7.x86_64", "product_id": "docker-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-python-0:0.7.1-37.el7.x86_64", "product": { "name": "docker-python-0:0.7.1-37.el7.x86_64", "product_id": "docker-python-0:0.7.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-python@0.7.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_id": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-logrotate@1.4.1-37.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.src" }, "product_reference": "docker-0:1.4.1-37.el7.src", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-logrotate-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-python-0:0.7.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64" }, "product_reference": "docker-python-0:0.7.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" }, "product_reference": "python-websocket-client-0:0.14.1-37.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Docker Inc." ] } ], "cve": "CVE-2014-9356", "discovery_date": "2014-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172761" } ], "notes": [ { "category": "description", "text": "It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Path traversal during processing of absolute symlinks", "title": "Vulnerability summary" }, { "category": "other", "text": "* This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\n* Red Hat does not support or recommend running untrusted images.\n\n* In Red Hat OpenStack Platform, because the flaw\u0027s impact is low and docker is not directly used by the director-operator, no update will be provided at this time for the operator containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9356" }, { "category": "external", "summary": "RHBZ#1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9356", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Path traversal during processing of absolute symlinks" }, { "cve": "CVE-2014-9357", "discovery_date": "2014-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172782" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Escalation of privileges during decompression of LZMA archives", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\nRed Hat does not support or recommend running untrusted images.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9357" }, { "category": "external", "summary": "RHBZ#1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9357", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9357" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Escalation of privileges during decompression of LZMA archives" } ] }
rhsa-2015:0623
Vulnerability from csaf_redhat
Published
2015-03-05 03:18
Modified
2024-11-22 08:47
Summary
Red Hat Security Advisory: docker security, bug fix, and enhancement update
Notes
Topic
Updated docker packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 7
Extras.
Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Docker is a service providing container management on Linux.
It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)
A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)
Red Hat would like to thank Docker Inc. for reporting these issues.
The docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.
The docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)
Bug fixes:
* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the "docker inspect" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from "docker inspect" is now uniform. (BZ#1092773)
* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)
* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing "docker run" failed to create containers. This update fixes the default path to the secrets directory and "docker run" now executes successfully. (BZ#1102568)
* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)
* When executing the "docker attach" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running "docker attach" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)
* The "docker run" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of "docker run" impossible. This update fixes the inconsistencies within the exit codes of "docker run". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)
* Adding a new registry with the "--registry-prepend" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The "--registry-prepend" option has been renamed to "--registry-add" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)
All docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated docker packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 7\nExtras.\n\nRed Hat Product Security has rated this update as having Low security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Docker is a service providing container management on Linux.\n\nIt was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356)\n\nA flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357)\n\nRed Hat would like to thank Docker Inc. for reporting these issues.\n\nThe docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages.\n\nThe docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351)\n\nBug fixes:\n\n* The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the \"docker inspect\" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from \"docker inspect\" is now uniform. (BZ#1092773)\n\n* The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009)\n\n* The Docker service contained an incorrect path for the secrets directory. As a consequence, executing \"docker run\" failed to create containers. This update fixes the default path to the secrets directory and \"docker run\" now executes successfully. (BZ#1102568)\n\n* It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430)\n\n* When executing the \"docker attach\" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running \"docker attach\" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608)\n\n* The \"docker run\" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of \"docker run\" impossible. This update fixes the inconsistencies within the exit codes of \"docker run\". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807)\n\n* Adding a new registry with the \"--registry-prepend\" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The \"--registry-prepend\" option has been renamed to \"--registry-add\" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153)\n\nAll docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0623", "url": "https://access.redhat.com/errata/RHSA-2015:0623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1092773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1092773" }, { "category": "external", "summary": "1100009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1100009" }, { "category": "external", "summary": "1102568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102568" }, { "category": "external", "summary": "1113608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113608" }, { "category": "external", "summary": "1162807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162807" }, { "category": "external", "summary": "1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "1174351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174351" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0623.json" } ], "title": "Red Hat Security Advisory: docker security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:47:54+00:00", "generator": { "date": "2024-11-22T08:47:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0623", "initial_release_date": "2015-03-05T03:18:20+00:00", "revision_history": [ { "date": "2015-03-05T03:18:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-03-05T10:28:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:47:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_id": "python-websocket-client-0:0.14.1-37.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-websocket-client@0.14.1-37.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.src", "product": { "name": "docker-0:1.4.1-37.el7.src", "product_id": "docker-0:1.4.1-37.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "docker-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-0:1.4.1-37.el7.x86_64", "product_id": "docker-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker@1.4.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-python-0:0.7.1-37.el7.x86_64", "product": { "name": "docker-python-0:0.7.1-37.el7.x86_64", "product_id": "docker-python-0:0.7.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-python@0.7.1-37.el7?arch=x86_64" } } }, { "category": "product_version", "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_id": "docker-logrotate-0:1.4.1-37.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/docker-logrotate@1.4.1-37.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.src" }, "product_reference": "docker-0:1.4.1-37.el7.src", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-logrotate-0:1.4.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64" }, "product_reference": "docker-logrotate-0:1.4.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "docker-python-0:0.7.1-37.el7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64" }, "product_reference": "docker-python-0:0.7.1-37.el7.x86_64", "relates_to_product_reference": "7Server-EXTRAS" }, { "category": "default_component_of", "full_product_name": { "name": "python-websocket-client-0:0.14.1-37.el7.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" }, "product_reference": "python-websocket-client-0:0.14.1-37.el7.noarch", "relates_to_product_reference": "7Server-EXTRAS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Docker Inc." ] } ], "cve": "CVE-2014-9356", "discovery_date": "2014-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172761" } ], "notes": [ { "category": "description", "text": "It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Path traversal during processing of absolute symlinks", "title": "Vulnerability summary" }, { "category": "other", "text": "* This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\n* Red Hat does not support or recommend running untrusted images.\n\n* In Red Hat OpenStack Platform, because the flaw\u0027s impact is low and docker is not directly used by the director-operator, no update will be provided at this time for the operator containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9356" }, { "category": "external", "summary": "RHBZ#1172761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9356", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9356" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Path traversal during processing of absolute symlinks" }, { "cve": "CVE-2014-9357", "discovery_date": "2014-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1172782" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Docker service unpacked images or builds after a \"docker pull\". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "docker: Escalation of privileges during decompression of LZMA archives", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.\n\nRed Hat does not support or recommend running untrusted images.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9357" }, { "category": "external", "summary": "RHBZ#1172782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9357", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9357" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw", "url": "https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw" } ], "release_date": "2014-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T03:18:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0623" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:N/C:N/I:C/A:N", "version": "2.0" }, "products": [ "7Server-EXTRAS:docker-0:1.4.1-37.el7.src", "7Server-EXTRAS:docker-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-logrotate-0:1.4.1-37.el7.x86_64", "7Server-EXTRAS:docker-python-0:0.7.1-37.el7.x86_64", "7Server-EXTRAS:python-websocket-client-0:0.14.1-37.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "docker: Escalation of privileges during decompression of LZMA archives" } ] }
gsd-2014-9357
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-9357", "description": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.", "id": "GSD-2014-9357", "references": [ "https://www.suse.com/security/cve/CVE-2014-9357.html", "https://access.redhat.com/errata/RHSA-2015:0623", "https://alas.aws.amazon.com/cve/html/CVE-2014-9357.html", "https://linux.oracle.com/cve/CVE-2014-9357.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-9357" ], "details": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.", "id": "GSD-2014-9357", "modified": "2023-12-13T01:22:48.733554Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003cv1.3.3", "affected_versions": "All versions before 1.3.3", "cvss_v2": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "cwe_ids": [ "CWE-1035", "CWE-264", "CWE-78", "CWE-937" ], "date": "2022-04-12", "description": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.", "fixed_versions": [ "v1.3.3" ], "identifier": "CVE-2014-9357", "identifiers": [ "GHSA-997c-fj8j-rq5h", "CVE-2014-9357" ], "not_impacted": "All versions starting from 1.3.3", "package_slug": "go/github.com/docker/docker", "pubdate": "2022-02-15", "solution": "Upgrade to version 1.3.3 or above.", "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2014-9357", "https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2", "https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11", "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357", "http://www.securityfocus.com/archive/1/534215/100/0/threaded", "https://github.com/advisories/GHSA-997c-fj8j-rq5h" ], "uuid": "4701d2df-9636-4d4d-9b93-6004805eccf5", "versions": [ { "commit": { "sha": "541e9971e0acf501272f32df6ed99ac72feec832", "tags": [ "v1.3.3" ], "timestamp": "20141211153717" }, "number": "v1.3.3" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9357" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "refsource": "CONFIRM", "tags": [], "url": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "name": "20141212 Docker 1.3.3 - Security Advisory [11 Dec 2014]", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-09T19:55Z", "publishedDate": "2014-12-16T18:59Z" } } }
cve-2014-9357
Vulnerability from fkie_nvd
Published
2014-12-16 18:59
Modified
2024-11-21 02:20
Severity ?
Summary
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docker:docker:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B6B6AB7-1ABB-4CD7-9C34-621263595589", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction." }, { "lang": "es", "value": "Docker 1.3.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios root a trav\u00e9s de (1) una imagen manipulada o (2) un build manipulado en in fichero Docker en un archivo LZMA (.xz), relacionado con el chroot para la extracci\u00f3n de archivos." } ], "id": "CVE-2014-9357", "lastModified": "2024-11-21T02:20:41.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-16T18:59:15.950", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-997c-fj8j-rq5h
Vulnerability from github
Published
2022-02-15 01:57
Modified
2021-05-12 17:42
Severity ?
Summary
Arbitrary Code Execution
Details
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/docker/docker" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.3.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2014-9357" ], "database_specific": { "cwe_ids": [ "CWE-285" ], "github_reviewed": true, "github_reviewed_at": "2021-05-12T17:42:53Z", "nvd_published_at": null, "severity": "HIGH" }, "details": "Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.", "id": "GHSA-997c-fj8j-rq5h", "modified": "2021-05-12T17:42:53Z", "published": "2022-02-15T01:57:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9357" }, { "type": "WEB", "url": "https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2" }, { "type": "WEB", "url": "https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "type": "WEB", "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ" }, { "type": "WEB", "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Arbitrary Code Execution" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.