Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:0623 - Security Advisory
Issued:
2015-03-05
Updated:
2015-03-05

RHSA-2015:0623 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: docker security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated docker packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 7
Extras.

Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

Docker is a service providing container management on Linux.

It was found that a malicious container image could overwrite arbitrary portions
of the host file system by including absolute symlinks, potentially leading to
privilege escalation. (CVE-2014-9356)

A flaw was found in the way the Docker service unpacked images or builds after a
"docker pull". An attacker could use this flaw to provide a malicious image or
build that, when unpacked, would escalate their privileges on the system.
(CVE-2014-9357)

Red Hat would like to thank Docker Inc. for reporting these issues.

The docker-python subpackage provides the new Atomic tool. The goal of Atomic is
to provide a high level, coherent entry point for Red Hat Enterprise Linux
Atomic Host. Atomic makes it easier to interact with special kinds of
containers, such as super-privileged debugging tools. Comprehensive information
and documentation is available in the atomic manual pages.

The docker packages have been upgraded to upstream version 1.4.1, which provides
a number of bug fixes and enhancements over the previous version, most notably
an experimental overlayfs storage driver. (BZ#1174351)

Bug fixes:

  • The JSON configuration files for containers and images were inconsistent. As a

consequence, when these files were parsed by the "docker inspect" command, the
output was unnecessarily complex. This update improves the key naming schema in
the configuration files and the output from "docker inspect" is now uniform.
(BZ#1092773)

  • The /run directory had an incorrect SELinux label. As a consequence,

containers could not access /run. This update corrects the SELinux label and
containers now have access to /run. (BZ#1100009)

  • The Docker service contained an incorrect path for the secrets directory. As a

consequence, executing "docker run" failed to create containers. This update
fixes the default path to the secrets directory and "docker run" now executes
successfully. (BZ#1102568)

  • It was not possible to specify a default repository in the configuration file

in cases where all docker.io files are inaccessible. As a consequence, running
docker commands failed because they could not contact the default repositories.
Now, it is possible to specify a local Docker repository, and commands no longer
fail because they are able to connect to a local private repository.
(BZ#1106430)

  • When executing the "docker attach" command on a container which was in the

process of shutting down, the process did not fail, but became unresponsive.
This bug has been fixed, and running "docker attach" on a container which is
shutting down causes the attach process to fail with an informative error
message that it is not possible to attach to a stopped container. (BZ#1113608)

  • The "docker run" sub-command incorrectly returned non-zero exit codes, when

they all should have been zero. As a consequence, it was not possible to
differentiate between the exit codes of the docker command line and exit codes
of contained processes, which in turn made automated control of "docker run"
impossible. This update fixes the inconsistencies within the exit codes of
"docker run". Additionally, this update also fixes inconsistencies of other
docker sub-commands and improves the language in the error and warning messages.
(BZ#1162807)

  • Adding a new registry with the "--registry-prepend" option did not follow the

correct order to query and download an image. As a consequence, it did not query
the prepended new registry first, but rather started with querying docker.io.
The "--registry-prepend" option has been renamed to "--registry-add" and its
behavior has been changed to query the registries added in the given order, with
docker.io queried last. (BZ#1186153)

All docker users are advised to upgrade to these updated packages, which correct
these issues and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server from RHUI 7 x86_64

Fixes

  • BZ - 1092773 - Image and container JSON keys have no consistency
  • BZ - 1100009 - /run is broken with SELinux
  • BZ - 1102568 - Wrong path of default secrets docker tries to open
  • BZ - 1113608 - `docker attach` hangs when attaching container, which is exiting
  • BZ - 1162807 - Docker CLI exit codes for errors?
  • BZ - 1172761 - CVE-2014-9356 docker: Path traversal during processing of absolute symlinks
  • BZ - 1172782 - CVE-2014-9357 docker: Escalation of privileges during decompression of LZMA archives
  • BZ - 1174351 - docker 1.4.1 is available

CVEs

  • CVE-2014-9357
  • CVE-2014-9356

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
x86_64
docker-1.4.1-37.el7.x86_64.rpm SHA-256: 2ec036c84500a05889d830dc13a79fb66731e0ac1ea93f1e96670a555a57ec14
docker-logrotate-1.4.1-37.el7.x86_64.rpm SHA-256: 1d36a19aa4ef4acc75e859dbe580e075edd6e6784ff1a6923d511c00a463bc5d
docker-python-0.7.1-37.el7.x86_64.rpm SHA-256: 7ba3b071242ec552cbcb2ebce2b7ca26ddf900b3880dbb1d674113db1ccc41b8
python-websocket-client-0.14.1-37.el7.noarch.rpm SHA-256: 2cb6adfb158fbec18f95fd7ffbeee4c84715c13ad6aea3f5c31d72fb544690b8

Red Hat Enterprise Linux Server from RHUI 7

SRPM
x86_64
docker-1.4.1-37.el7.x86_64.rpm SHA-256: 2ec036c84500a05889d830dc13a79fb66731e0ac1ea93f1e96670a555a57ec14
docker-logrotate-1.4.1-37.el7.x86_64.rpm SHA-256: 1d36a19aa4ef4acc75e859dbe580e075edd6e6784ff1a6923d511c00a463bc5d
docker-python-0.7.1-37.el7.x86_64.rpm SHA-256: 7ba3b071242ec552cbcb2ebce2b7ca26ddf900b3880dbb1d674113db1ccc41b8
python-websocket-client-0.14.1-37.el7.noarch.rpm SHA-256: 2cb6adfb158fbec18f95fd7ffbeee4c84715c13ad6aea3f5c31d72fb544690b8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility