Ubuntu 6336-1: Docker Registry vulnerabilities
Summary
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.04 LTS (Available with Ubuntu Pro) - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Docker Registry could be made to crash if it received specially crafted input. Software Description: - docker-registry: Docker toolset to pack, ship, store, and deliver content Details: It was discovered that Docker Registry incorrectly handled certain crafted input, A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-11468) It was discovered that Docker Registry incorrectly handled certain crafted input. An attacker could possibly use this issue to cause a denial of service. (CVE-2023-2253)
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: docker-registry 2.8.1+ds1-2ubuntu1.1 Ubuntu 22.04 LTS (Available with Ubuntu Pro): docker-registry 2.8.0+ds1-4ubuntu0.1~esm2 Ubuntu 20.04 LTS: docker-registry 2.7.1+ds2-7ubuntu0.3 Ubuntu 18.04 LTS (Available with Ubuntu Pro): docker-registry 2.6.2~ds1-1ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): docker-registry 2.3.0~ds1-1ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-6336-1
CVE-2017-11468, CVE-2023-2253
Package Information
https://launchpad.net/ubuntu/+source/docker-registry/2.8.1+ds1-2ubuntu1.1 https://launchpad.net/ubuntu/+source/docker-registry/2.7.1+ds2-7ubuntu0.3