Docker image layers are stored with a non-globally unique identifier vulnerable to a collision attack. These identifiers are shared during docker pull and push, allowing poisoning of a host's image cache. This allows maliciously crafted images to poison subsequently pulled images. Independently discovered by Florian Weimer of Red Hat and Tõnis Tiigi of the Docker Engine Tem.
Created docker-io tracking bugs for this issue: Affects: fedora-all [bug 1271261]
This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content. Marking this vulnerability and its children as "WONTFIX".
We will get the fix from docker when we release docker-1.9.
Statement: This issue is exploitable by malicious Docker images. Red Hat supports images from it's own registry, ISV images certified by the Red Hat certification program, and images using qualified customer content.
Fixed in 1.8.3 and greater.