First published: Mon Dec 16 2024(Updated: )
Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. (CVE-2024-41110)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/docker.io | <26.1.3-0ubuntu1.1 | 26.1.3-0ubuntu1.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/docker.io | <26.1.3-0ubuntu1~24.04.1+esm1 | 26.1.3-0ubuntu1~24.04.1+esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/docker.io | <20.10.21-0ubuntu1~18.04.3+esm1 | 20.10.21-0ubuntu1~18.04.3+esm1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7161-1 is considered high due to the potential for data exfiltration through DNS queries.
To fix USN-7161-1, update Docker to the versions 26.1.3-0ubuntu1.1 for Ubuntu 24.10, 26.1.3-0ubuntu1~24.04.1+esm1 for Ubuntu 24.04, or 20.10.21-0ubuntu1~18.04.3+esm1 for Ubuntu 18.04.
USN-7161-1 affects the Docker package in Ubuntu 18.04, 20.04, and 24.10 versions.
The vulnerability addressed in USN-7161-1 was discovered by Yair Zak.
Yes, USN-7161-1 can potentially allow attackers to exfiltrate sensitive information by manipulating DNS queries.