[SECURITY] Fedora 37 Update: moby-engine-24.0.5-1.fc37

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-cf3551046d
2023-09-05 00:46:10.109475
--------------------------------------------------------------------------------

Name        : moby-engine
Product     : Fedora 37
Version     : 24.0.5
Release     : 1.fc37
URL         : https://www.docker.com
Summary     : The open-source application container engine
Description :
Docker is an open source project to build, ship and run any application as a
lightweight container.

Docker containers are both hardware-agnostic and platform-agnostic. This means
they can run anywhere, from your laptop to the largest EC2 compute instance and
everything in between - and they don't require you to use a particular
language, framework or packaging system. That makes them great building blocks
for deploying and scaling web apps, databases, and backend services without
depending on a particular stack or provider.

--------------------------------------------------------------------------------
Update Information:

- Update moby-engine to 24.0.5 - Security fix for CVE-2021-41803 - Security fix
for CVE-2023-28842 - Security fix for CVE-2023-28841 - Security fix for
CVE-2023-28840 - Security fix for CVE-2023-0845 - Security fix for
CVE-2023-26054 - Security fix for CVE-2022-3064 - Security fix for
CVE-2022-40716 - Security fix for CVE-2023-25173  ----  Update moby-engine to
23.0.4
--------------------------------------------------------------------------------
ChangeLog:

* Wed Aug 23 2023 LuK1337 <priv.luk@xxxxxxxxx> - 24.0.5-1
- Update moby-engine to 24.0.5
* Thu Jul 20 2023 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx>
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2156860 - CVE-2022-40716 consul: Consul Service Mesh Intention Bypass with Malicious Certificate Signing Request
        https://bugzilla.redhat.com/show_bug.cgi?id=2156860
  [ 2 ] Bug #2163037 - CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
        https://bugzilla.redhat.com/show_bug.cgi?id=2163037
  [ 3 ] Bug #2174485 - CVE-2023-25173 containerd: Supplementary groups are not set up properly
        https://bugzilla.redhat.com/show_bug.cgi?id=2174485
  [ 4 ] Bug #2176447 - CVE-2023-26054 buildkit: Data disclosure in provenance attestation describing a build
        https://bugzilla.redhat.com/show_bug.cgi?id=2176447
  [ 5 ] Bug #2177595 - CVE-2023-0845 hashicorp/consul: Consul Server Panic when Ingress and API Gateways Configured with Peering Connections
        https://bugzilla.redhat.com/show_bug.cgi?id=2177595
  [ 6 ] Bug #2184683 - CVE-2023-28840 moby: Encrypted overlay network may be unauthenticated
        https://bugzilla.redhat.com/show_bug.cgi?id=2184683
  [ 7 ] Bug #2184685 - CVE-2023-28841 moby: Encrypted overlay network traffic may be unencrypted
        https://bugzilla.redhat.com/show_bug.cgi?id=2184685
  [ 8 ] Bug #2184688 - CVE-2023-28842 moby: Encrypted overlay network with a single endpoint is unauthenticated
        https://bugzilla.redhat.com/show_bug.cgi?id=2184688
  [ 9 ] Bug #2189788 - CVE-2021-41803 consul: Consul Auto-Config JWT Authorization Missing Input Validation
        https://bugzilla.redhat.com/show_bug.cgi?id=2189788
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-cf3551046d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux