openSUSE Security Update : docker (openSUSE-SU-2014:1722-1)

Critical Nessus Plugin ID 80278


The remote openSUSE host is missing a security update.


This docker version update fixes the following security and non security issues and adds additional features.

- Updated to 1.4.0 (2014-12-11) :

- Notable Features since 1.3.0 :

- Set key=value labels to the daemon (displayed in `docker info`), applied with new `-label` daemon flag

- Add support for `ENV` in Dockerfile of the form: `ENV name=value name2=value2...`

- New Overlayfs Storage Driver

- `docker info` now returns an `ID` and `Name` field

- Filter events by event name, container, or image

- `docker cp` now supports copying from container volumes

- Fixed `docker tag`, so it honors `--force` when overriding a tag for existing image.

- Changes introduced by 1.3.3 (2014-12-11) :

- Security :

- Fix path traversal vulnerability in processing of absolute symbolic links (CVE-2014-9356) - (bnc#909709)

- Fix decompression of xz image archives, preventing privilege escalation (CVE-2014-9357) - (bnc#909710)

- Validate image IDs (CVE-2014-9358) - (bnc#909712)

- Runtime :

- Fix an issue when image archives are being read slowly

- Client :

- Fix a regression related to stdin redirection

- Fix a regression with `docker cp` when destination is the current directory


Update the affected docker packages.

See Also

Plugin Details

Severity: Critical

ID: 80278

File Name: openSUSE-2014-820.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2014/12/29

Modified: 2014/12/29

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:docker, p-cpe:/a:novell:opensuse:docker-bash-completion, p-cpe:/a:novell:opensuse:docker-debuginfo, p-cpe:/a:novell:opensuse:docker-debugsource, p-cpe:/a:novell:opensuse:docker-zsh-completion, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2014/12/17

Reference Information

CVE: CVE-2014-9356, CVE-2014-9357, CVE-2014-9358