-----BEGIN PGP SIGNATURE-----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=Bg5R
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7474-1
May 01, 2025
docker.io vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Docker.
Software Description:
- docker.io: reusable Go packages included with Docker
Details:
Cory Snider discovered that Docker incorrectly handled networking packet
encapsulation. An attacker could use this issue to inject internet
packets in established connection, possibly causing a denial of service or
bypassing firewall protections. This issue only affected Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. (CVE-2023-28840, CVE-2023-28841,
CVE-2023-28842)
Rory McNamara discovered that Docker incorrectly handled cache in the
BuildKit toolkit. An attacker could possibly use this issue to expose
sensitive information. (CVE-2024-23651)
It was discovered that Docker incorrectly handled parallel operations in
some circumstances, which could possibly lead to undefined behavior.
(CVE-2024-36621, CVE-2024-36623)
Rory McNamara discovered that Docker incorrectly verified file paths during
a certain command in the BuildKit toolkit. An attacker could possibly use
this issue to delete arbitrary files from the system. (CVE-2024-23652)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
golang-github-docker-docker-dev 20.10.25+dfsg1-2ubuntu1+esm2
Available with Ubuntu Pro
Ubuntu 22.04 LTS
golang-github-docker-docker-dev 20.10.21-0ubuntu1~22.04.7+esm2
Available with Ubuntu Pro
Ubuntu 20.04 LTS
golang-github-docker-docker-dev 20.10.21-0ubuntu1~20.04.6+esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
docker.io 20.10.21-0ubuntu1~18.04.3+esm3
Available with Ubuntu Pro
golang-github-docker-docker-dev 20.10.21-0ubuntu1~18.04.3+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7474-1
CVE-2023-28840, CVE-2023-28841, CVE-2023-28842, CVE-2024-23651,
CVE-2024-23652, CVE-2024-36621, CVE-2024-36623
No comments:
Post a Comment