Bug 2276026 (CVE-2024-32473)

Summary: CVE-2024-32473 moby: IPv6 enabled on IPv4-only network interfaces
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: gparvin, lbainbri, njean, owatkins, pahickey, rhaigner
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: moby 26.0.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Moby, an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling and runtimes. In certain versions, IPv6 is not disabled on network interfaces, including those belonging to networks where "--ipv6=false". A container with an "ipvlan" or "macvlan" interface will normally be configured to share an external network link with the host machine, and because of this direct access, containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses. Additionally, if router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses and the interface will be a member of IPv6 multicast groups. This means interfaces IPv4-only networks present an unexpectedly and unnecessarily increased attack surface
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2290430    
Bug Blocks: 2276009    

Description Robb Gatica 2024-04-19 04:10:40 UTC
Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. In 26.0.0, IPv6 is not disabled on network interfaces, including those belonging to networks where `--ipv6=false`. An container with an `ipvlan` or `macvlan` interface will normally be configured to share an external network link with the host machine. Because of this direct access, (1) Containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses, (2) if router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses, and (3) the interface  will be a member of IPv6 multicast groups. This means interfaces in IPv4-only networks present an unexpectedly and unnecessarily increased attack surface. The issue is patched in 26.0.2. To completely disable IPv6 in a container, use `--sysctl=net.ipv6.conf.all.disable_ipv6=1` in the `docker create` or `docker run` command. Or, in the service configuration of a `compose` file.

https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642
https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9

Comment 1 Anten Skrabec 2024-06-04 19:12:14 UTC
Created golang-github-docker tracking bugs for this issue:

Affects: fedora-all [bug 2290430]