Upstream information
Description
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
- SUSE-SU-2014:1648-1, published Mon Dec 15 06:04:41 MST 2014
- openSUSE-SU-2014:1596-1, published Mon, 8 Dec 2014 17:07:52 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Module for Containers 12 |
| |
SUSE Linux Enterprise Module for Containers 15 SP1 |
| |
SUSE Linux Enterprise Module for Containers 15 SP2 |
| |
SUSE Linux Enterprise Module for Containers 15 |
| |
SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server for SAP Applications 12 |
| Patchnames: SUSE-SLE-SERVER-12-2014-111 |
SUSE OpenStack Cloud 6 |
| |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA docker |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
SUSE Linux Enterprise Module for Containers 12 | docker | Released |
SUSE Linux Enterprise Module for Containers 12 | sle2docker | Released |