Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1172761 - (CVE-2014-9356) CVE-2014-9356 docker: Path traversal during processing of absolute symlinks
CVE-2014-9356 docker: Path traversal during processing of absolute symlinks
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20141211,reported=2...
: Security
Depends On: 1173324 1173325
Blocks: 1198578
  Show dependency treegraph
 
Reported: 2014-12-10 12:03 EST by Trevor Jay
Modified: 2015-07-27 09:28 EDT (History)
3 users (show)

See Also:
Fixed In Version: docker 1.3.3
Doc Type: Bug Fix
Doc Text:
It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0623 normal SHIPPED_LIVE Low: docker security, bug fix, and enhancement update 2015-03-05 10:28:35 EST

  None (edit)
Description Trevor Jay 2014-12-10 12:03:41 EST
A problem was reported by Docker Inc. whereby a malicious image could overwrite arbitrary portions of the host filesystem by including absolute symlinks. From the upstream report:

"Path traversal attacks are possible in the processing of absolute symlinks. In checking symlinks for traversals, only relative links were considered. This allowed path traversals to exist where they should have otherwise been prevented. This was exploitable via both archive extraction and through volume mounts.

This vulnerability allowed malicious images or builds from malicious Dockerfiles to write files to the host system and escape containerization, leading to privilege escalation."
Comment 1 Trevor Jay 2014-12-10 12:24:46 EST
Statement:

This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.

Red Hat does not support or recommend running untrusted images.
Comment 2 Vincent Danen 2014-12-11 15:50:37 EST
External References:

https://groups.google.com/forum/#!topic/docker-user/nFAz-B-n4Bw
Comment 3 Vincent Danen 2014-12-11 16:01:59 EST
Created docker-io tracking bugs for this issue:

Affects: fedora-all [bug 1173324]
Affects: epel-6 [bug 1173325]
Comment 4 Trevor Jay 2014-12-11 20:59:14 EST
Acknowledgements:

Red Hat would like to thank Docker Inc. for reporting this issue.
Comment 5 Fedora Update System 2014-12-14 23:32:41 EST
docker-io-1.4.0-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2015-01-25 21:35:26 EST
docker-io-1.4.1-6.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 7 Fedora Update System 2015-01-31 11:53:19 EST
docker-io-1.4.1-3.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.