Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-41091: Merge pull request #2 from moby/20.10-GHSA-3fwx-pjgw-3558_0701-perms · moby/moby@f0ab919

Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically /var/lib/docker) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.

CVE
#linux#docker

@@ -88,7 +88,17 @@ func Init(home string, options []string, uidMaps, gidMaps []idtools.IDMap) (grap

return nil, graphdriver.ErrNotSupported

}

if err := idtools.MkdirAllAndChown(path.Join(home, linkDir), 0701, idtools.CurrentIdentity()); err != nil {

remappedRoot := idtools.NewIDMappingsFromMaps(uidMaps, gidMaps)

currentID := idtools.CurrentIdentity()

dirID := idtools.Identity{

UID: currentID.UID,

GID: remappedRoot.RootPair().GID,

}

if err := idtools.MkdirAllAndChown(home, 0710, dirID); err != nil {

return nil, err

}

if err := idtools.MkdirAllAndChown(path.Join(home, linkDir), 700, currentID); err != nil {

return nil, err

}

@@ -173,11 +183,15 @@ func (d *Driver) create(id, parent string, opts *graphdriver.CreateOpts) (retErr

}

root := idtools.Identity{UID: rootUID, GID: rootGID}

currentID := idtools.CurrentIdentity()

if err := idtools.MkdirAllAndChown(path.Dir(dir), 0701, currentID); err != nil {

dirID := idtools.Identity{

UID: rootUID,

GID: rootGID,

}

if err := idtools.MkdirAllAndChown(path.Dir(dir), 0710, dirID); err != nil {

return err

}

if err := idtools.MkdirAndChown(dir, 0701, currentID); err != nil {

if err := idtools.MkdirAndChown(dir, 0710, dirID); err != nil {

return err

}

@@ -211,7 +225,7 @@ func (d *Driver) create(id, parent string, opts *graphdriver.CreateOpts) (retErr

return nil

}

if err := idtools.MkdirAndChown(path.Join(dir, workDirName), 0701, currentID); err != nil {

if err := idtools.MkdirAndChown(path.Join(dir, workDirName), 0710, dirID); err != nil {

return err

}

Related news

Gentoo Linux Security Advisory 202409-29

Gentoo Linux Security Advisory 202409-29 - Multiple vulnerabilities have been discovered in Docker, the worst of which could result in denial of service. Versions greater than or equal to 25.0.4 are affected.

GHSA-3fwx-pjgw-3558: Moby (Docker Engine) Insufficiently restricted permissions on data directory

## Impact A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. ## Patches This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. ## Workarounds Limit access to the host to trusted users. Limit access to host volumes to trusted containers. ## Credits The Moby project would li...

CVE-2022-29085: DSA-2022-021: Dell Unity, Dell UnityVSA, and Dell Unity XT Security Update for Multiple Vulnerabilities

Dell Unity, Dell UnityVSA, and Dell Unity XT versions prior to 5.2.0.0.5.173 contain a plain-text password storage vulnerability when certain off-array tools are run on the system. The credentials of a user with high privileges are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907