CVE-2024-41110

Public on 2024-07-24
Modified on 2024-08-01
Description
AWS is aware of CVE-2024-41110, an issue affecting the Moby open source project, packaged in Amazon Linux as "docker". Docker is a component of several open source container management systems.

This issue does not affect the default configuration of docker. If an authorization plugin is enabled, a specially-crafted API request to the docker daemon will be forwarded to the authorization plugin in a way that could lead to unintended actions, such as privilege escalation. Enabling an authorization plugin is an atypical configuration. The affected API endpoint is not exposed to the network in either the default, typical, or recommended configurations. The default EKS and ECS configurations do not expose the API endpoint to the network. Enabling a Docker authorization plugin is not supported when using ECS. Finally, docker is not installed on EKS AMIs newer than 1.24. Although Docker is installed in EKS 1.24 and earlier, EKS does not support authorization plugins.

Updated docker packages addressing the issue are available for Amazon Linux 2 (docker-20.10.25-1.amzn2.0.5 and docker-25.0.6-1.amzn2.0.1) and for Amazon Linux 2023 (docker-25.0.6-1amzn2023.0.1). AWS recommends that customers using docker upgrade to these or later versions.
Severity
Important severity
Important
CVSS v3 Base Score
8.2
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core amazon-cloudwatch-agent 2024-08-28 ALAS2-2024-2630 Fixed
Amazon Linux 2023 amazon-cloudwatch-agent 2024-08-28 ALAS2023-2024-708 Fixed
Amazon Linux 1 docker No Fix Planned
Amazon Linux 2 - Docker Extra docker 2024-07-29 ALAS2DOCKER-2024-040 Fixed
Amazon Linux 2 - Ecs Extra docker 2024-08-27 ALAS2ECS-2024-042 Fixed
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra docker 2024-07-29 ALAS2NITRO-ENCLAVES-2024-041 Fixed
Amazon Linux 2023 docker 2024-07-29 ALAS2023-2024-674 Fixed
Amazon Linux 1 ecs-init Not Affected

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
NVD CVSSv3 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H