USN-7161-2: Docker vulnerabilities

18 February 2025

Several security issues were fixed in Docker.

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it
for source package docker.io in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and source
package docker.io-app for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.

USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and
Ubuntu 18.04 LTS. This update fixes it for source package docker.io-app in
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.

Original advisory details:

Yair Zak discovered that Docker could unexpectedly forward DNS requests
from internal networks in an unexpected manner. An attacker could possibly
use this issue to exfiltrate data by encoding information in DNS queries
to controlled nameservers. This issue was only addressed for the source package
docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018)

Cory Snider discovered that Docker did not properly handle authorization
plugin request processing. An attacker could possibly use this issue to
bypass authorization controls by forwarding API requests without their
full body, leading to unauthorized actions. This issue was only addressed for
the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS,
and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04

In general, a standard system update will make all the necessary changes.

Related notices