UPDATED 07:00 EDT / DECEMBER 15 2014

Docker dodges another security flaw with new patch

small__6464695023Docker’s container tech has been hit by more security woes, with the revelation that an earlier security patch has led to a brand new vulnerability being discovered in the software.

Docker rolled out version 1.3.2 last month in order to patch a bug that allowed rogue programs to break out of their containers and access image files on the host operating system. But this update has now been supplanted by Docker 1.3.3, and users are being urged to update as soon as possible.

Once again the new flaw was discovered by the security researcher Tõnis Tiigi. Writing in a blog post, he explained Docker 1.3.2 added a new “chroot” sandboxing feature that closed off a vulnerability that could be exploited when uncompressing Docker images. However, the new version introduced another vulnerability that attackers can exploit by including malicious .xz binaries in image files. This means attackers could potentially execute malicious code by using root-user privileges on affected systems.

Security is unfortunately beginning to become a bit of a sore point for Docker, which has risen to prominence as a simpler alternative to virtualization, especially in the cloud.

Docker has also come under attack from its new rival CoreOS, which builds a lightweight Linux distro designed with containers in mind, and recently introduced its own, alternative container technology. Alex Polvi, CEO of CoreOS, claimed that Docker’s security model was “broken”, and that its “Docker-as-a-platform” design was “fundamentally flawed”. As a result, CoreOS is now building its own container technology called Rocket.

Naturally Docker has brushed off these criticisms, insisting that security is of “paramount importance” as it rolled out two new versions of its software last week. As well as version 1.3.3, it simultaneously introduced Docker version 1.4.0, which contained more than 180 bug fixes.

“In the future, we expect new execution engine plugins to offer more choice and greater granularity for our security-focused users,” said Docker’s Marianna Tessel in a blog post.

According to Tessel, Docker 1.3.3 introduces signed images into its repositories to guard against malicious attacks. Meanwhile, she also proposed a new ‘trust system’ to help customers ensure any images they download are legitimate.

photo credit: Ingrid Taylar via photopin cc


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU