Summary: | <app-emulation/docker-1.3.2: two vulnerabilities (CVE-2014-{6407,6408}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | admwiggin, anigl, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/11/24/5 | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-11-25 08:35:48 UTC
+*docker-1.3.2 (26 Nov 2014) + + 26 Nov 2014; Kacper Kowalik <xarthisius@gentoo.org> +docker-1.3.2.ebuild, + -docker-1.3.1.ebuild: + Version bump, drop old wrt bug #530518 Maintainer(s), Thank you for your work. No GLSA needed as there are no stable versions. *** Bug 530892 has been marked as a duplicate of this bug. *** CVE-2014-6408 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6408): Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image. CVE-2014-6407 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6407): Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. |