Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[🐸 Frogbot] Update version of github.com/docker/docker to 27.1.1 #28

Open
wants to merge 1 commit into
base: dev
Choose a base branch
from

Conversation

github-actions[bot]
Copy link

🚨 This automated pull request was created by Frogbot and fixes the below:

📦 Vulnerable Dependencies

✍️ Summary

SEVERITY CONTEXTUAL ANALYSIS DIRECT DEPENDENCIES IMPACTED DEPENDENCY FIXED VERSIONS CVES

Critical
Not Covered github.com/testcontainers/testcontainers-go:v0.32.0
github.com/docker/docker:v27.0.3+incompatible
github.com/docker/docker v27.0.3+incompatible [23.0.15]
[25.0.6]
[26.1.5]
[27.1.1]
CVE-2024-41110

🔬 Research Details

Description:
Docker Engine is an open-source containerization platform that allows developers to package applications and their dependencies into portable containers. It includes the Docker Daemon, Docker CLI, and a REST API for managing containers, images, networks, and volumes.

Moby is an open-source project that provides the core components and frameworks for containerization. It serves as the foundation for Docker Engine, offering modular tools like containerd and runc that can be used to build custom container systems.

Authorization plugin (AuthZ) in Docker are used to control access to Docker resources and operations based on user-defined policies. They allow administrators to implement custom authorization logic for various Docker actions, ensuring that only authorized users can perform specific operations.

An attacker could exploit this vulnerability by sending a maliciously crafted API request with the Content-Length HTTP header set to 0, causing the Docker daemon to forward the request without a body to the AuthZ plugin. In some cases, the plugin could approve the request and if it does, it could potentially allow unauthorized actions.


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant