First published: Mon Oct 04 2021(Updated: )
## Impact A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. ## Patches This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. ## Workarounds Ensure that any configured `credsStore` or `credHelpers` entries in the configuration file reference an installed credential helper that is executable and on the `PATH`. ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/docker/cli/issues/new/choose) * Email us at security@docker.com if you think you’ve found a security bug
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Command Line Interface | <20.10.9 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
go/github.com/docker/cli | <20.10.9 | 20.10.9 |
<20.10.9 | ||
=34 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-41092.
The severity of CVE-2021-41092 is high, with a CVSS score of 7.5.
The affected software includes Docker Command Line Interface, Fedora 34, and Fedora 35.
CVE-2021-41092 is a bug found in the Docker CLI where running 'docker login my-private-registry.example.com' with a misconfigured configuration file can lead to credential leakage.
Yes, a fix is available for CVE-2021-41092. It is recommended to update to the latest version of Docker CLI.