First published: Tue Feb 18 2025(Updated: )
USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and Ubuntu 18.04 LTS. This updates fixes it in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. Original advisory details: Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. (CVE-2024-41110)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/docker.io | <26.1.3-0ubuntu1~22.04.1+esm1 | 26.1.3-0ubuntu1~22.04.1+esm1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/docker.io | <26.1.3-0ubuntu1~20.04.1+esm1 | 26.1.3-0ubuntu1~20.04.1+esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/docker.io | <20.10.21-0ubuntu1~18.04.3+esm2 | 20.10.21-0ubuntu1~18.04.3+esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/docker.io | <18.09.7-0ubuntu1~16.04.9+esm2 | 18.09.7-0ubuntu1~16.04.9+esm2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7161-2 addresses CVE-2024-29018 and CVE-2024-41110 in multiple Ubuntu versions including 16.04, 18.04, 20.04, and 22.04.
To fix USN-7161-2, update the docker.io package to the specified versions for your Ubuntu release.
USN-7161-2 affects Ubuntu 16.04, 18.04, 20.04, and 22.04 LTS.
The severity of USN-7161-2 is determined by the impact of CVE-2024-29018 and CVE-2024-41110, which can vary based on the specific configurations of the affected systems.
While not mandatory, it is highly recommended to update to mitigate potential security risks associated with the vulnerabilities.