DescriptionDocker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- SUSE-SU-2014:1648-1, published Mon Dec 15 06:04:41 MST 2014
- openSUSE-SU-2014:1596-1, published Mon, 8 Dec 2014 17:07:52 +0100 (CET)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Linux Enterprise Module for Containers 12|| |
|SUSE Linux Enterprise Module for Containers 15 SP1|| |
|SUSE Linux Enterprise Module for Containers 15|| |
|SUSE Linux Enterprise Server 12 |
SUSE Linux Enterprise Server for SAP Applications 12
|SUSE OpenStack Cloud 6|| |
|openSUSE Tumbleweed|| ||Patchnames:
openSUSE Tumbleweed GA docker
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise 12 Module for Containers||docker||Released|
|SUSE Linux Enterprise 12 Module for Containers||sle2docker||Released|