CVE-2021-41089

Published: 04 October 2021

A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host's filesystem, widening access to others.

From the Ubuntu security team

Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine subsystem in Docker incorrectly allowed the docker cp command to make permissions changes in the host filesystem in some situations. A local attacker could possibly use to this to expose sensitive information or gain administrative privileges.

Priority

Medium

Status

Package Release Status
docker.io
Launchpad, Ubuntu, Debian
Upstream
Released (20.10.9)
Ubuntu 21.10 (Impish Indri) Needed

Ubuntu 21.04 (Hirsute Hippo)
Released (20.10.7-0ubuntu1~21.04.2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (20.10.7-0ubuntu1~20.04.2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (20.10.7-0ubuntu1~18.04.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (18.09.7-0ubuntu1~16.04.9+esm1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/moby/moby/commit/80f1169eca587305759829e626cebd2a434664f6