Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html | third party advisory |
https://groups.google.com/forum/#%21msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ | |
https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12 | third party advisory |
https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/ | not applicable vendor advisory |
https://www.docker.com/legal/docker-cve-database | vendor advisory |