Upstream information

CVE-2014-3499 at MITRE

Description

Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 885209 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Containers 12
  • docker >= 1.6.2-31.2
Patchnames:
SUSE Linux Enterprise Module for Containers 12 GA docker
SUSE Linux Enterprise Module for Containers 15
  • docker >= 17.09.1_ce-4.25
  • docker-bash-completion >= 17.09.1_ce-4.25
Patchnames:
SUSE Linux Enterprise Module for Containers 15 GA docker
SUSE Linux Enterprise Server 12
  • docker >= 1.2.0-3.12
Patchnames:
SUSE Linux Enterprise Server 12 GA docker
SUSE OpenStack Cloud 6
  • docker >= 1.9.1-58.1
Patchnames:
SUSE OpenStack Cloud 6 GA docker
openSUSE Tumbleweed
  • docker >= 1.12.3-4.1
  • docker-bash-completion >= 1.12.3-4.1
  • docker-test >= 1.12.3-4.1
  • docker-zsh-completion >= 1.12.3-4.1
Patchnames:
openSUSE Tumbleweed GA docker