Source: docker.io
Version: 20.10.24+dfsg1-1
Severity: serious
Tags: security
Justification: security

Dear Maintainer,

security vulnerability has been detected in certain versions of Docker Engine,
which could allow an attacker to bypass authorization plugins (AuthZ) under
specific circumstances. The base likelihood of this being exploited is low.
Using a specially-crafted API request, an Engine API client could make the
daemon forward the request or response to an authorization plugin without the
body. In certain circumstances, the authorization plugin may allow a request
which it would have otherwise denied if the body had been forwarded to it. A
security issue was discovered In 2018, where an attacker could bypass AuthZ
plugins using a specially crafted API request. This could lead to unauthorized
actions, including privilege escalation. Although this issue was fixed in
Docker Engine v18.09.1 in January 2019, the fix was not carried forward to
later major versions, resulting in a regression. Anyone who depends on
authorization plugins that introspect the request and/or response body to make
access control decisions is potentially impacted.

I plan to prepare a PU

Bastien

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to