vipinsun / minifabric

Do fabric network the right and easy way.
Apache License 2.0
0 stars 0 forks source link

CVE-2021-41089 (Low) detected in github.com/docker/docker-v1.4.2-0.20191101170500-ac7306503d23, github.com/Docker/Docker-v20.10.8+incompatible #136

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2021-41089 - Low Severity Vulnerability

Vulnerable Libraries - github.com/docker/docker-v1.4.2-0.20191101170500-ac7306503d23, github.com/Docker/Docker-v20.10.8+incompatible

github.com/docker/docker-v1.4.2-0.20191101170500-ac7306503d23

Moby Project - a collaborative project for the container ecosystem to assemble container-based systems

Library home page: https://proxy.golang.org/github.com/docker/docker/@v/v1.4.2-0.20191101170500-ac7306503d23.zip

Path to dependency file: /chaincode/simple/go/go.mod

Path to vulnerable library: /chaincode/simple/go/go.mod,/chaincode/samplecc/go/go.mod

Dependency Hierarchy: - github.com/hyperledger/fabric-v1.4.1 (Root Library) - github.com/fsouza/go-dockerclient-v1.6.5 - :x: **github.com/docker/docker-v1.4.2-0.20191101170500-ac7306503d23** (Vulnerable Library)

github.com/Docker/Docker-v20.10.8+incompatible

Library home page: https://proxy.golang.org/github.com/!docker/!docker/@v/v20.10.8+incompatible.zip

Path to dependency file: /chaincode/cmcc/go/go.mod

Path to vulnerable library: /chaincode/cmcc/go/go.mod

Dependency Hierarchy: - github.com/hyperledger/fabric-v1.4.1 (Root Library) - github.com/fsouza/go-dockerclient-v1.7.3 - :x: **github.com/Docker/Docker-v20.10.8+incompatible** (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.

Publish Date: 2021-10-04

URL: CVE-2021-41089

CVSS 3 Score Details (2.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4

Release Date: 2021-10-04

Fix Resolution: v20.10.9


Step up your Open Source Security Game with Mend here