An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Moby | Mobyproject | * | 17.06.0 (excluding) |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/grafana-rhel8:2.6.0-7 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/istio-cni-rhel8:2.6.0-21 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/istio-must-gather-rhel8:2.6.0-7 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/istio-rhel8-operator:2.6.0-27 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/kiali-ossmc-rhel8:1.73.10-3 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/kiali-rhel8:1.73.9-2 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/kiali-rhel8-operator:1.73.10-2 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/pilot-rhel8:2.6.0-19 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 8 | RedHat | openshift-service-mesh/ratelimit-rhel8:2.6.0-8 | * |
Red Hat OpenShift Service Mesh 2.6 for RHEL 9 | RedHat | openshift-service-mesh/proxyv2-rhel9:2.6.0-18 | * |
Docker.io | Ubuntu | bionic | * |
Docker.io | Ubuntu | cosmic | * |
Docker.io | Ubuntu | devel | * |
Docker.io | Ubuntu | xenial | * |