MGASA-2016-0043

Source
https://advisories.mageia.org/MGASA-2016-0043.html
Import Source
https://advisories.mageia.org/MGASA-2016-0043.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0043
Related
Published
2016-02-05T17:26:09Z
Modified
2016-02-05T17:14:44Z
Summary
Updated docker/golang packages fix security vulnerability
Details

Manipulated layer IDs could have lead to local graph poisoning (CVE-2014-8178).

Manifest validation and parsing logic errors allowed pull-by-digest validation bypass (CVE-2014-8179).

To fix these issues, the golang package has been updated to version 1.4.3 and the docker package has been updated to version 1.9.1.

References
Credits

Affected packages

Mageia:5 / docker

Package

Name
docker
Purl
pkg:rpm/mageia/docker?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.1-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3-1.mga5

Ecosystem specific

{
    "section": "core"
}