USN-7161-2: Docker vulnerabilities
18 February 2025
Several security issues were fixed in Docker.
Releases
Packages
- docker.io - Linux container runtime
- docker.io-app - Linux container runtime
Details
USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it
in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 24.10, and Ubuntu 24.04 LTS.
USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and
Ubuntu 18.04 LTS. This updates fixes it in Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS.
Original advisory details:
Yair Zak discovered that Docker could unexpectedly forward DNS requests
from internal networks in an unexpected manner. An attacker could possibly
use this issue to exfiltrate data by encoding information in DNS queries
to controlled nameservers. This issue was only addressed in
Ubuntu 24.04 LTS. (CVE-2024-29018)
Cory Snider discovered that Docker did not properly handle authorization
plugin request processing. An attacker could possibly use this issue to
bypass authorization controls by forwarding API requests without their
full body, leading to unauthorized actions. (CVE-2024-41110)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
docker.io
-
26.1.3-0ubuntu1~22.04.1+esm1
Available with Ubuntu Pro
Ubuntu 20.04
-
docker.io
-
26.1.3-0ubuntu1~20.04.1+esm1
Available with Ubuntu Pro
Ubuntu 18.04
-
docker.io
-
20.10.21-0ubuntu1~18.04.3+esm2
Available with Ubuntu Pro
Ubuntu 16.04
-
docker.io
-
18.09.7-0ubuntu1~16.04.9+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.