<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for docker</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:1625-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-28T10:05:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-28T10:05:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-28T10:05:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for docker</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for docker fixes the following issues:

- CVE-2022-36109: Fixed a supplementary group permissions bypass (bsc#1205375).

Update to 20.10.23-ce (https://docs.docker.com/engine/release-notes/#201023).

- drop kubic flavor as kubic is EOL.

Update to Docker 20.10.21-ce (https://docs.docker.com/engine/release-notes/#201021 bsc#1206065).

- Fix wrong After: in docker.service, fixes bsc#1188447
- Build with Go 1.18.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-Azure-Basic-On-Demand-2023-1625,Image SLES12-SP5-Azure-Standard-On-Demand-2023-1625,Image SLES12-SP5-EC2-ECS-On-Demand-2023-1625,Image SLES12-SP5-EC2-On-Demand-2023-1625,Image SLES12-SP5-GCE-On-Demand-2023-1625,SUSE-2023-1625,SUSE-SLE-Module-Containers-12-2023-1625</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231625-1/</URL>
      <Description>Link for SUSE-SU-2023:1625-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-March/028425.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:1625-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188447</URL>
      <Description>SUSE Bug 1188447</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205375</URL>
      <Description>SUSE Bug 1205375</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206065</URL>
      <Description>SUSE Bug 1206065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36109/</URL>
      <Description>SUSE CVE CVE-2022-36109 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-Basic-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-Basic-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-Basic-On-Demand">Image SLES12-SP5-Azure-Basic-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-Standard-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-Standard-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-Standard-On-Demand">Image SLES12-SP5-Azure-Standard-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand">Image SLES12-SP5-GCE-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="docker-20.10.23_ce-98.89.1">
      <FullProductName ProductID="docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="docker-bash-completion-20.10.23_ce-98.89.1">
      <FullProductName ProductID="docker-bash-completion-20.10.23_ce-98.89.1">docker-bash-completion-20.10.23_ce-98.89.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="docker-fish-completion-20.10.23_ce-98.89.1">
      <FullProductName ProductID="docker-fish-completion-20.10.23_ce-98.89.1">docker-fish-completion-20.10.23_ce-98.89.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="docker-zsh-completion-20.10.23_ce-98.89.1">
      <FullProductName ProductID="docker-zsh-completion-20.10.23_ce-98.89.1">docker-zsh-completion-20.10.23_ce-98.89.1</FullProductName>
    </Branch>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-Basic-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of Image SLES12-SP5-Azure-Basic-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-Standard-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of Image SLES12-SP5-Azure-Standard-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of Image SLES12-SP5-GCE-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-20.10.23_ce-98.89.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:docker-20.10.23_ce-98.89.1">docker-20.10.23_ce-98.89.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.</Note>
    </Notes>
    <CVE>CVE-2022-36109</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-Basic-On-Demand:docker-20.10.23_ce-98.89.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:docker-20.10.23_ce-98.89.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:docker-20.10.23_ce-98.89.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:docker-20.10.23_ce-98.89.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:docker-20.10.23_ce-98.89.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:docker-20.10.23_ce-98.89.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231625-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36109.html</URL>
        <Description>CVE-2022-36109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205375</URL>
        <Description>SUSE Bug 1205375</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
