=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.10.5.0800 docker.io: Multiple vulnerabilities 5th October 2021 =========================================================================== Product: docker.io Publisher: Ubuntu Operating System: Ubuntu UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-41089 Original Bulletin: https://ubuntu.com/security/notices/USN-5103-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running docker.io check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5103-1: docker.io vulnerability 04 October 2021 Docker could be made to adjust the permissions of files. Releases o Ubuntu 21.04 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS o Ubuntu 16.04 ESM Packages o docker.io - Linux container runtime Details Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in Docker incorrectly allowed the docker cp command to make permissions changes in the host filesystem in some situations. A local attacker could possibly use to this to expose sensitive information or gain administrative privileges. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04 o docker.io - 20.10.7-0ubuntu1~21.04.2 Ubuntu 20.04 o docker.io - 20.10.7-0ubuntu1~20.04.2 Ubuntu 18.04 o docker.io - 20.10.7-0ubuntu1~18.04.2 Ubuntu 16.04 o docker.io - 18.09.7-0ubuntu1~16.04.9+esm1 Available with UA Infra or UA Desktop In general, a standard system update will make all the necessary changes. References o CVE-2021-41089 - --------------------------END INCLUDED TEXT-------------------- ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT