Bug 909710 (CVE-2014-9357) - VUL-0: CVE-2014-9357: docker: Escalation of privileges during decompression of LZMA archives
Summary: VUL-0: CVE-2014-9357: docker: Escalation of privileges during decompression o...
Status: RESOLVED FIXED
Alias: CVE-2014-9357
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/111524/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-12-12 13:47 UTC by Alexander Bergmann
Modified: 2018-12-14 15:10 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-12-12 13:47:08 UTC
rh#1172782

Docker Inc. has discovered an issue whereby a malicious image could execute arbitrary code when being unpacked automatically after a "docker pull". From the Docker Inc report:

"It has been discovered that the introduction of chroot for archive extraction in Docker 1.3.2 had introduced a privilege escalation vulnerability. Malicious images or builds from malicious Dockerfiles could escalate privileges and execute arbitrary code as a root user on the Docker host by providing a malicious ‘xz’ binary.

We are releasing Docker 1.3.3 to address this vulnerability. Only Docker 1.3.2 is vulnerable. Users are highly encouraged to upgrade."

CVE-2014-9357 was assigned to this issue.

References:
https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw
https://bugzilla.redhat.com/show_bug.cgi?id=1172782
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9357
Comment 2 Bernhard Wiedemann 2014-12-12 17:00:24 UTC
This is an autogenerated message for OBS integration:
This bug (909710) was mentioned in
https://build.opensuse.org/request/show/265019 13.2 / docker
Comment 3 Marcus Meissner 2014-12-12 20:22:48 UTC
If possible I would release the original docker update first and then start the next update right afterwards on SLE12.
Comment 4 Flavio Castelli 2014-12-15 09:11:55 UTC
Yeah, this is possible.
Comment 9 Marcus Meissner 2014-12-18 18:00:49 UTC
acfcepted to sle12 and 13.2. do not forget factory too!
Comment 10 Flavio Castelli 2014-12-19 12:56:43 UTC
Fixed.
Comment 11 Bernhard Wiedemann 2014-12-19 13:01:12 UTC
This is an autogenerated message for OBS integration:
This bug (909710) was mentioned in
https://build.opensuse.org/request/show/265920 Factory / docker
Comment 12 Swamp Workflow Management 2014-12-27 21:07:45 UTC
openSUSE-SU-2014:1722-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 909709,909710,909712
CVE References: CVE-2014-9356,CVE-2014-9357,CVE-2014-9358
Sources used:
openSUSE 13.2 (src):    docker-1.4.0-13.1
Comment 13 Swamp Workflow Management 2015-01-19 16:05:01 UTC
SUSE-SU-2015:0082-1: An update that solves three vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 909709,909710,909712,913211,913213
CVE References: CVE-2014-9356,CVE-2014-9357,CVE-2014-9358
Sources used:
SUSE Linux Enterprise Server 12 (src):    docker-1.4.1-16.1