Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-41089: Merge pull request #4 from moby/20.10-ghsa-v994-f8vw-g7j4-chroot-mkdir · moby/moby@bce32e5

Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using docker cp into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.

CVE
#docker

@@ -74,13 +74,17 @@ func untarHandler(tarArchive io.Reader, dest string, options *archive.TarOptions

options.ExcludePatterns = []string{}

}

idMapping := idtools.NewIDMappingsFromMaps(options.UIDMaps, options.GIDMaps)

rootIDs := idMapping.RootPair()

// If dest is inside a root then directory is created within chroot by extractor.

// This case is only currently used by cp.

if dest == root {

idMapping := idtools.NewIDMappingsFromMaps(options.UIDMaps, options.GIDMaps)

rootIDs := idMapping.RootPair()

dest = filepath.Clean(dest)

if _, err := os.Stat(dest); os.IsNotExist(err) {

if err := idtools.MkdirAllAndChownNew(dest, 0755, rootIDs); err != nil {

return err

dest = filepath.Clean(dest)

if _, err := os.Stat(dest); os.IsNotExist(err) {

if err := idtools.MkdirAllAndChownNew(dest, 0755, rootIDs); err != nil {

return err

}

}

}

Related news

Gentoo Linux Security Advisory 202409-29

Gentoo Linux Security Advisory 202409-29 - Multiple vulnerabilities have been discovered in Docker, the worst of which could result in denial of service. Versions greater than or equal to 25.0.4 are affected.

GHSA-v994-f8vw-g7j4: `docker cp` allows unexpected chmod of host files in Moby Docker Engine

## Impact A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. ## Patches This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted. ## Workarounds Ensure you only run trusted containers. ## Credits The Moby project would like to thank Lei Wang and Ruizhi Xiao for responsibly disclosing this issue in accordance with the [Moby security policy](https://github.com/moby/moby/blob/master/SECURITY.md). ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/moby/moby/issues/new) * Email us at  [email protected]  if you th...

CVE-2022-29085: DSA-2022-021: Dell Unity, Dell UnityVSA, and Dell Unity XT Security Update for Multiple Vulnerabilities

Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907