USN-5103-1: docker.io vulnerability

Publication date

4 October 2021

Overview

Docker could be made to adjust the permissions of files.


Packages

Details

Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in
Docker incorrectly allowed the docker cp command to make permissions
changes in the host filesystem in some situations. A local attacker
could possibly use to this to expose sensitive information or gain
administrative privileges.

Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in
Docker incorrectly allowed the docker cp command to make permissions
changes in the host filesystem in some situations. A local attacker
could possibly use to this to expose sensitive information or gain
administrative privileges.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
21.04 hirsute docker.io –  20.10.7-0ubuntu1~21.04.2
20.04 focal docker.io –  20.10.7-0ubuntu1~20.04.2
18.04 bionic docker.io –  20.10.7-0ubuntu1~18.04.2
16.04 xenial docker.io –  18.09.7-0ubuntu1~16.04.9+esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›