{"id":"CVE-2014-8179","details":"Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.","modified":"2026-04-16T01:40:09.202360285Z","published":"2019-12-17T18:15:13Z","withdrawn":"2026-01-27T04:13:23.869228Z","related":["SUSE-SU-2015:1757-1","SUSE-SU-2025:03540-1","SUSE-SU-2025:03545-1","openSUSE-SU-2024:10532-1","openSUSE-SU-2025:15589-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-10/msg00036.html"},{"type":"ARTICLE","url":"https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/"},{"type":"ADVISORY","url":"https://github.com/docker/docker/blob/master/CHANGELOG.md#183-2015-10-12"},{"type":"ADVISORY","url":"https://www.docker.com/legal/docker-cve-database"},{"type":"WEB","url":"https://groups.google.com/forum/#%21msg/docker-dev/bWVVtLNbFy8/UaefOqMOCAAJ"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}