Security Bulletin
Summary
Docker CLI is vulnerable to attacks to obtain sensitive information. Docker CLI is used by Cloud Pak System as part to the infrastructure to manage the images and containers in the system. Cloud Pak System addressed this vulnerability.
Vulnerability Details
CVEID: CVE-2021-41092
DESCRIPTION: Docker CLI could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw when running "docker login my-private-registry.example.com" command with a misconfigured configuration file. By sending a specially-crafted HTTP request, an attacker could exploit this vulnerability to obtain credentials information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/210712 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N)
Affected Products and Versions
Affected Product(s) | Version(s) | Supporting Product |
sIBM Cloud Pak System Software Suite | 2.3.3.0 - 2.3.3.1, 2.3.3.2, 2.3.3.3 | Docker Private Registry for Red Hat Enterprise Linux 7 , Docker 20.10.3 |
IBM Cloud Pak System | 2.3.0.1, 2.3.1.1, 2.3.3.1, 2.3.3.2, 2.3.3.3, 2.3.3.3.ifix1 | Docker Private Registry for Red Hat Enterprise Linux 7 , Docker 20.10.3 |
Remediation/Fixes
For unsupported version/release/platform IBM recommends upgrading to a fixed, supported /release/platform of the product.
The recommended solution is to apply the applicable IBM Cloud Pak System Interim Fix as soon as practical.
In Cloud Pak System v2.3.3.4 Docker Private Registry uses Docker CLI v20.10.9 for Red Hat Enterprise Linux 8.
IBM Cloud Pak System V2.3.3.4 provides ptype docker v20.10.9.
For IBM Cloud Pak System V2.3.0 through to V2.3.3.3 Interim Fix 1.
upgrade to IBM Cloud Pak System V2.3.3.4 at Fix Central
Information on upgrading at : http://www.ibm.com/support/docview.wss?uid=ibm10887959
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
29 Nov 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
06 May 2022
UID
ibm16579889