Bugzilla – Bug 930235
VUL-0: CVE-2015-3630, CVE-2015-3631, CVE-2015-3627,CVE-2015-3629: docker: various security issues
Last modified: 2018-12-14 15:10:44 UTC
Docker Inc. released docker 1.6.1 to fix the following vulnerabilities: - Fix read/write /proc paths (CVE-2015-3630) - Prohibit VOLUME /proc and VOLUME / (CVE-2015-3631) - Fix opening of file-descriptor 1 (CVE-2015-3627) - Fix symlink traversal on container respawn allowing local privilege escalation (CVE-2015-3629) We have to update our docker package from version 1.6.0 to 1.6.1
I created the following maintenance requests: * SLE: https://build.suse.de/request/show/57276 * openSUSE: https://build.opensuse.org/request/show/305956
updates were submitted and accepted, reassign to security-team
openSUSE-SU-2015:0905-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 930235 CVE References: CVE-2015-3627,CVE-2015-3629,CVE-2015-3630,CVE-2015-3631 Sources used: openSUSE 13.2 (src): docker-1.6.1-28.1
SUSE-SU-2015:0984-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 930235,931301 CVE References: CVE-2015-3627,CVE-2015-3629,CVE-2015-3630,CVE-2015-3631 Sources used: SUSE Linux Enterprise Server 12 (src): docker-1.6.2-31.2
released
*** Bug 945060 has been marked as a duplicate of this bug. ***