{"id":"MGASA-2016-0043","summary":"Updated docker/golang packages fix security vulnerability","details":"Manipulated layer IDs could have lead to local graph poisoning\n(CVE-2014-8178).\n\nManifest validation and parsing logic errors allowed pull-by-digest\nvalidation bypass (CVE-2014-8179).\n\nTo fix these issues, the golang package has been updated to version 1.4.3\nand the docker package has been updated to version 1.9.1.\n","modified":"2026-04-16T01:45:48.175482752Z","published":"2016-02-05T17:26:09Z","upstream":["CVE-2014-8178","CVE-2014-8179"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0043.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16984"},{"type":"WEB","url":"https://blog.docker.com/2015/10/security-release-docker-1-8-3-1-6-2-cs7/"},{"type":"WEB","url":"http://blog.docker.com/2015/11/docker-1-9-production-ready-swarm-multi-host-networking/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00014.html"}],"affected":[{"package":{"name":"docker","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/docker?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.1-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0043.json"}},{"package":{"name":"golang","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/golang?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.3-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0043.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}