drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Docker (Aktualisierung)
| Name: |
Zwei Probleme in Docker (Aktualisierung) |
|
| ID: |
USN-7161-2 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS |
|
| Datum: |
Di, 18. Februar 2025, 18:21 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-29018
https://www.cve.org/CVERecord?id=CVE-2024-41110 |
|
| Applikationen: |
Docker |
|
| Update von: |
Zwei Probleme in Docker |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0075413412115500147== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------wvs256QgaMw849xdqRUsDOoq"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------wvs256QgaMw849xdqRUsDOoq Content-Type: multipart/mixed; boundary="------------7gWpUA1vGA0sqc0GiEARJ8Uz"; protected-headers="v1" From: Vyom Yadav <vyom.yadav@canonical.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <6788b84a-a13f-45da-a6f6-c63c2060240d@canonical.com> Subject: [USN-7161-2] Docker vulnerabilities
--------------7gWpUA1vGA0sqc0GiEARJ8Uz Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7161-2 February 18, 2025
Docker vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Docker.
Software Description: - docker.io-app: Linux container runtime - docker.io: Linux container runtime
Details:
USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and Ubuntu 18.04 LTS. This updates fixes it in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Original advisory details:
Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-29018)
Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. (CVE-2024-41110)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS docker.io 26.1.3-0ubuntu1~22.04.1+esm1 Available with Ubuntu Pro
Ubuntu 20.04 LTS docker.io 26.1.3-0ubuntu1~20.04.1+esm1 Available with Ubuntu Pro
Ubuntu 18.04 LTS docker.io 20.10.21-0ubuntu1~18.04.3+esm2 Available with Ubuntu Pro
Ubuntu 16.04 LTS docker.io 18.09.7-0ubuntu1~16.04.9+esm2 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7161-2 https://ubuntu.com/security/notices/USN-7161-1 CVE-2024-29018, CVE-2024-41110
--------------7gWpUA1vGA0sqc0GiEARJ8Uz--
--------------wvs256QgaMw849xdqRUsDOoq Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wnsEABYIACMWIQSV2d7RU755utSnx3O7Ba3EKYsoKQUCZ7Rg/wUDAAAAAAAKCRC7Ba3EKYsoKcJt AP9e7iamyIKQF+kffv1TW4lYXQX+4L3901NDi+7d/NnvXgD+Jbs/KCcLR29Ujam4qr2aPt+PO8Vh o6SVgvhSFwdOjws= =bn0u -----END PGP SIGNATURE-----
--------------wvs256QgaMw849xdqRUsDOoq--
--===============0075413412115500147== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============0075413412115500147==--
|
|
|
|