Lucene search

K
mageiaGentoo FoundationMGASA-2023-0009
HistoryJan 24, 2023 - 10:58 a.m.

Updated docker packages fix security vulnerability

2023-01-2410:58:24
Gentoo Foundation
advisories.mageia.org
57
docker
security vulnerability
server side
group restrictions
information leak
moby engine
unix

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.02 Low

EPSS

Percentile

89.0%

Server side request forgery (CVE-2022-29153) Bypass primary group restrictions due to a flaw in the supplementary group access setup (CVE-2022-36109) Imported Nodes/Services Information leak in moby-engine. (CVE-2022-3920)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchdocker< 20.10.22-1docker-20.10.22-1.mga8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.02 Low

EPSS

Percentile

89.0%