First published: Wed Dec 04 2019(Updated: )
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Cs Engine | <1.6.2-cs7 | |
Docker Docker | <1.8.3 | |
openSUSE openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
This vulnerability is identified by CVE-2014-8179.
The severity of CVE-2014-8179 is high with a severity value of 7.5.
The affected software includes Docker Engine versions before 1.8.3 and CS Docker Engine versions before 1.6.2-CS7.
This vulnerability allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation during a Docker pull operation.
Yes, you can find references to CVE-2014-8179 at the following links: [link1](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html), [link2](http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html), [link3](https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/).