Thursday, May 1, 2025

[USN-7474-1] Docker vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=Bg5R
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7474-1
May 01, 2025

docker.io vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Docker.

Software Description:
- docker.io: reusable Go packages included with Docker

Details:

Cory Snider discovered that Docker incorrectly handled networking packet
encapsulation. An attacker could use this issue to inject internet
packets in established connection, possibly causing a denial of service or
bypassing firewall protections. This issue only affected Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 18.04 LTS. (CVE-2023-28840, CVE-2023-28841,
CVE-2023-28842)

Rory McNamara discovered that Docker incorrectly handled cache in the
BuildKit toolkit. An attacker could possibly use this issue to expose
sensitive information. (CVE-2024-23651)

It was discovered that Docker incorrectly handled parallel operations in
some circumstances, which could possibly lead to undefined behavior.
(CVE-2024-36621, CVE-2024-36623)

Rory McNamara discovered that Docker incorrectly verified file paths during
a certain command in the BuildKit toolkit. An attacker could possibly use
this issue to delete arbitrary files from the system. (CVE-2024-23652)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  golang-github-docker-docker-dev  20.10.25+dfsg1-2ubuntu1+esm2
                                  Available with Ubuntu Pro

Ubuntu 22.04 LTS
  golang-github-docker-docker-dev  20.10.21-0ubuntu1~22.04.7+esm2
                                  Available with Ubuntu Pro

Ubuntu 20.04 LTS
  golang-github-docker-docker-dev  20.10.21-0ubuntu1~20.04.6+esm2
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  docker.io                       20.10.21-0ubuntu1~18.04.3+esm3
                                  Available with Ubuntu Pro
  golang-github-docker-docker-dev  20.10.21-0ubuntu1~18.04.3+esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7474-1
  CVE-2023-28840, CVE-2023-28841, CVE-2023-28842, CVE-2024-23651,
  CVE-2024-23652, CVE-2024-36621, CVE-2024-36623

No comments:

Post a Comment