{"id":"USN-7161-2","summary":"Docker vulnerabilities","details":"USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it\n for source package docker.io in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and source\n package docker.io-app for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.\n\n USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and \nUbuntu 18.04 LTS. This update fixes it for source package docker.io-app in\n Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.\n\nOriginal advisory details:\n\n Yair Zak discovered that Docker could unexpectedly forward DNS requests\nfrom internal networks in an unexpected manner. An attacker could possibly\nuse this issue to exfiltrate data by encoding information in DNS queries \nto controlled nameservers. This issue was only addressed for the source package\ndocker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018)\n\nCory Snider discovered that Docker did not properly handle authorization \nplugin request processing. An attacker could possibly use this issue to \nbypass authorization controls by forwarding API requests without their \nfull body, leading to unauthorized actions. This issue was only addressed for \nthe source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, \nand the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110)\n","modified":"2026-02-10T04:46:14Z","published":"2025-02-18T08:22:46Z","related":["UBUNTU-CVE-2024-29018","UBUNTU-CVE-2024-41110"],"upstream":["CVE-2024-29018","CVE-2024-41110","UBUNTU-CVE-2024-29018","UBUNTU-CVE-2024-41110"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7161-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-29018"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41110"}],"affected":[{"package":{"name":"docker.io","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/docker.io@18.09.7-0ubuntu1~16.04.9+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"18.09.7-0ubuntu1~16.04.9+esm2"}]}],"versions":["1.6.2~dfsg1-1ubuntu4","1.10.2-0ubuntu3","1.10.2-0ubuntu4","1.10.3-0ubuntu1","1.10.3-0ubuntu4","1.10.3-0ubuntu5","1.10.3-0ubuntu6","1.11.2-0ubuntu5~16.04","1.12.1-0ubuntu13~16.04.1","1.12.3-0ubuntu4~16.04.2","1.12.6-0ubuntu1~16.04.1","1.13.1-0ubuntu1~16.04.2","17.03.2-0ubuntu2~16.04.1","18.06.1-0ubuntu1~16.04.2","18.06.1-0ubuntu1.2~16.04.1","18.09.2-0ubuntu1~16.04.1","18.09.5-0ubuntu1~16.04.2","18.09.7-0ubuntu1~16.04.1","18.09.7-0ubuntu1~16.04.4","18.09.7-0ubuntu1~16.04.5","18.09.7-0ubuntu1~16.04.6","18.09.7-0ubuntu1~16.04.7","18.09.7-0ubuntu1~16.04.9+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"18.09.7-0ubuntu1~16.04.9+esm2","binary_name":"docker.io"},{"binary_version":"18.09.7-0ubuntu1~16.04.9+esm2","binary_name":"golang-docker-dev"},{"binary_version":"18.09.7-0ubuntu1~16.04.9+esm2","binary_name":"golang-github-docker-docker-dev"},{"binary_version":"18.09.7-0ubuntu1~16.04.9+esm2","binary_name":"vim-syntax-docker"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-29018","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7161-2.json"}},{"package":{"name":"docker.io","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/docker.io@20.10.21-0ubuntu1~18.04.3+esm2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20.10.21-0ubuntu1~18.04.3+esm2"}]}],"versions":["1.13.1-0ubuntu6","17.03.2-0ubuntu1","17.03.2-0ubuntu3","17.03.2-0ubuntu5","17.12.1-0ubuntu1","18.06.1-0ubuntu1~18.04.1","18.06.1-0ubuntu1.2~18.04.1","18.09.2-0ubuntu1~18.04.1","18.09.5-0ubuntu1~18.04.2","18.09.7-0ubuntu1~18.04.1","18.09.7-0ubuntu1~18.04.3","18.09.7-0ubuntu1~18.04.4","19.03.6-0ubuntu1~18.04.1","19.03.6-0ubuntu1~18.04.2","19.03.6-0ubuntu1~18.04.3","20.10.2-0ubuntu1~18.04.2","20.10.2-0ubuntu1~18.04.3","20.10.7-0ubuntu1~18.04.1","20.10.7-0ubuntu1~18.04.2","20.10.7-0ubuntu5~18.04.2","20.10.7-0ubuntu5~18.04.3","20.10.12-0ubuntu2~18.04.1","20.10.21-0ubuntu1~18.04.2","20.10.21-0ubuntu1~18.04.3","20.10.21-0ubuntu1~18.04.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"20.10.21-0ubuntu1~18.04.3+esm2","binary_name":"docker.io"},{"binary_version":"20.10.21-0ubuntu1~18.04.3+esm2","binary_name":"golang-docker-dev"},{"binary_version":"20.10.21-0ubuntu1~18.04.3+esm2","binary_name":"golang-github-docker-docker-dev"},{"binary_version":"20.10.21-0ubuntu1~18.04.3+esm2","binary_name":"vim-syntax-docker"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-29018","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7161-2.json"}},{"package":{"name":"docker.io-app","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/docker.io-app@26.1.3-0ubuntu1~20.04.1+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"26.1.3-0ubuntu1~20.04.1+esm1"}]}],"versions":["20.10.25-0ubuntu1~20.04.1","20.10.25-0ubuntu1~20.04.2","24.0.5-0ubuntu1~20.04.1","24.0.7-0ubuntu2~20.04.1","26.1.3-0ubuntu1~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"26.1.3-0ubuntu1~20.04.1+esm1","binary_name":"docker.io"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-29018","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-41110","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7161-2.json"}},{"package":{"name":"docker.io-app","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/docker.io-app@26.1.3-0ubuntu1~22.04.1+esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"26.1.3-0ubuntu1~22.04.1+esm1"}]}],"versions":["20.10.25-0ubuntu1~22.04.1","20.10.25-0ubuntu1~22.04.2","24.0.5-0ubuntu1~22.04.1","24.0.7-0ubuntu2~22.04.1","26.1.3-0ubuntu1~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"26.1.3-0ubuntu1~22.04.1+esm1","binary_name":"docker.io"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-29018","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-41110","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7161-2.json"}}],"schema_version":"1.7.3"}