Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0533 Low: docker security, bug fix, and enhancement update 9 March 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: docker Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Linux variants Impact/Access: Increased Privileges -- Remote/Unauthenticated Overwrite Arbitrary Files -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-9357 CVE-2014-9356 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2015-0623.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running docker check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: docker security, bug fix, and enhancement update Advisory ID: RHSA-2015:0623-02 Product: RHEL Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0623.html Issue date: 2015-03-05 CVE Names: CVE-2014-9356 CVE-2014-9357 ===================================================================== 1. Summary: Updated docker packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having Low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux 7 Extras - noarch, x86_64 3. Description: Docker is a service providing container management on Linux. It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation. (CVE-2014-9356) A flaw was found in the way the Docker service unpacked images or builds after a "docker pull". An attacker could use this flaw to provide a malicious image or build that, when unpacked, would escalate their privileges on the system. (CVE-2014-9357) Red Hat would like to thank Docker Inc. for reporting these issues. The docker-python subpackage provides the new Atomic tool. The goal of Atomic is to provide a high level, coherent entry point for Red Hat Enterprise Linux Atomic Host. Atomic makes it easier to interact with special kinds of containers, such as super-privileged debugging tools. Comprehensive information and documentation is available in the atomic manual pages. The docker packages have been upgraded to upstream version 1.4.1, which provides a number of bug fixes and enhancements over the previous version, most notably an experimental overlayfs storage driver. (BZ#1174351) Bug fixes: * The JSON configuration files for containers and images were inconsistent. As a consequence, when these files were parsed by the "docker inspect" command, the output was unnecessarily complex. This update improves the key naming schema in the configuration files and the output from "docker inspect" is now uniform. (BZ#1092773) * The /run directory had an incorrect SELinux label. As a consequence, containers could not access /run. This update corrects the SELinux label and containers now have access to /run. (BZ#1100009) * The Docker service contained an incorrect path for the secrets directory. As a consequence, executing "docker run" failed to create containers. This update fixes the default path to the secrets directory and "docker run" now executes successfully. (BZ#1102568) * It was not possible to specify a default repository in the configuration file in cases where all docker.io files are inaccessible. As a consequence, running docker commands failed because they could not contact the default repositories. Now, it is possible to specify a local Docker repository, and commands no longer fail because they are able to connect to a local private repository. (BZ#1106430) * When executing the "docker attach" command on a container which was in the process of shutting down, the process did not fail, but became unresponsive. This bug has been fixed, and running "docker attach" on a container which is shutting down causes the attach process to fail with an informative error message that it is not possible to attach to a stopped container. (BZ#1113608) * The "docker run" sub-command incorrectly returned non-zero exit codes, when they all should have been zero. As a consequence, it was not possible to differentiate between the exit codes of the docker command line and exit codes of contained processes, which in turn made automated control of "docker run" impossible. This update fixes the inconsistencies within the exit codes of "docker run". Additionally, this update also fixes inconsistencies of other docker sub-commands and improves the language in the error and warning messages. (BZ#1162807) * Adding a new registry with the "--registry-prepend" option did not follow the correct order to query and download an image. As a consequence, it did not query the prepended new registry first, but rather started with querying docker.io. The "--registry-prepend" option has been renamed to "--registry-add" and its behavior has been changed to query the registries added in the given order, with docker.io queried last. (BZ#1186153) All docker users are advised to upgrade to these updated packages, which correct these issues and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1092773 - Image and container JSON keys have no consistency 1100009 - /run is broken with SELinux 1102568 - Wrong path of default secrets docker tries to open 1113608 - `docker attach` hangs when attaching container, which is exiting 1162807 - Docker CLI exit codes for errors? 1172761 - CVE-2014-9356 docker: Path traversal during processing of absolute symlinks 1172782 - CVE-2014-9357 docker: Escalation of privileges during decompression of LZMA archives 1174351 - docker 1.4.1 is available 6. Package List: Red Hat Enterprise Linux 7 Extras: Source: docker-1.4.1-37.el7.src.rpm noarch: python-websocket-client-0.14.1-37.el7.noarch.rpm x86_64: docker-1.4.1-37.el7.x86_64.rpm docker-logrotate-1.4.1-37.el7.x86_64.rpm docker-python-0.7.1-37.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9356 https://access.redhat.com/security/cve/CVE-2014-9357 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFU+DHpXlSAg2UNWIIRAly9AJ4ojPcNx80T9yuureW4F1EhGlbF5gCfbexP k2mYbecv/U9QrVGEXZLBvfY= =vTkf - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVPztvRLndAQH1ShLAQLdpxAAqm+2csDVX5mewv8Jxdg9Q/MWlgklki7A YBpe0PmGaT4yZl5zrafqCktHl6LYsaMCsftLU4xUMuhpg+l/Q/4G6eBP6ghzdDIo sW4vv8B6hIsFh4A9mM3fdTjAniVYlL44s8DcAcn97YM8XUKU4/dir2N9v0QyOCsk KjIP6DYpa5LN9njm6ODl6/wn3OGt0ExIHd3J+GdcuypXOBWzdHtbfjipcwxDkrCl xedl++sHUDhDi0/3pIVj0gvBWGicAXFNt2g0IsuE51iKBwTFqTQx4ttq2tMdxHLl E8G9Aw8rZwaPwqQ15uYKqEaQTOA+8KwdJyYscUIyDgXes40CKjLcAT8EW5bGJhhf GtQS6WhL0HrIjsXQtOc3bs90d8AxQR8C+x8qxjhvxA93yK2YTdXpIXIEe/fCJ4cJ sMouDe/VJ2f2d5wFMXgOSZAxfVixalUbo6jt3u2hRTFshSLNQXpxQcfepDR/EOLM AyE8qbwPgzfHQt4HauBwFCxp+LjKKH3j5e2fLGqSy6dcWZNbm0o3T8VYDTGMg5PE fC9FB+0+N2/Nx0sH3r+s4VAiOmeYtYphzJOH3erVkDse371fFZcIzz/ajOLo07Td k0rReoLdgyFCdNmf7THCG/N4Uglsle7GJ+2wRSwUOv9qfi9+W+c/4ae09tgdAJP/ /tDOgTWELqE= =r7Bx -----END PGP SIGNATURE-----