Bug 1271253 (CVE-2014-8178)

Summary: CVE-2014-8178 docker: Attacker controlled layer IDs lead to local graph content poisoning
Product: [Other] Security Response Reporter: Trevor Jay <tjay>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: adimania, admiller, bleanhar, ccoleman, dwalsh, golang-updates, hushan.jia, ichavero, jchaloup, jperrin, lsm5, manuel.wolfshant, mgoldman, miminar, s, thrcka, vbatts
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-10-13 14:01:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1271259, 1271260, 1271261    
Bug Blocks:    

Description Trevor Jay 2015-10-13 13:38:13 UTC
Docker image layers are stored with a non-globally unique identifier vulnerable to a collision attack. These identifiers are shared during docker pull and push, allowing poisoning of a host's image cache. This allows maliciously crafted images to poison subsequently pulled images.

Independently discovered by Florian Weimer of Red Hat and Tõnis Tiigi of the Docker Engine Tem.

Comment 2 Trevor Jay 2015-10-13 13:48:47 UTC
Created docker-io tracking bugs for this issue:

Affects: fedora-all [bug 1271261]

Comment 3 Trevor Jay 2015-10-13 14:01:37 UTC
This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content.

Marking this vulnerability and its children as "WONTFIX".

Comment 4 Daniel Walsh 2015-10-13 14:08:33 UTC
We will get the fix from docker when we release docker-1.9.

Comment 5 Vincent Danen 2015-10-15 17:22:52 UTC
Statement:

This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content.

Comment 6 Trevor Jay 2016-10-17 03:08:28 UTC
Fixed in 1.8.3 and greater.