Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
Typedeb
Namespacedebian
Namedocker.io
Version26.1.5+dfsg1-9
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1sky-21r5-3qcu
vulnerability_id VCID-1sky-21r5-3qcu
summary
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
Moby is an open source container framework originally developed by Docker Inc. as Docker. It is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. As a batteries-included container runtime, Moby comes with a built-in networking implementation that enables communication between containers, and between containers and external resources.

Moby's networking implementation allows for creating and using many networks, each with their own subnet and gateway. This feature is frequently referred to as custom networks, as each network can have a different driver, set of parameters, and thus behaviors. When creating a network, the `--internal` flag is used to designate a network as _internal_. The `internal` attribute in a docker-compose.yml file may also be used to mark a network _internal_, and other API clients may specify the `internal` parameter as well.

When containers with networking are created, they are assigned unique network interfaces and IP addresses (typically from a non-routable [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) subnet). The root network namespace (hereafter referred to as the 'host') serves as a router for non-internal networks, with a gateway IP that provides SNAT/DNAT to/from container IPs.

Containers on an _internal_ network may communicate between each other, but are precluded from communicating with any networks the host has access to (LAN or WAN) as no default route is configured, and firewall rules are set up to drop all outgoing traffic. Communication with the gateway IP address (and thus appropriately configured host services) is possible, and the host may communicate with any container IP directly.

In addition to configuring the Linux kernel's various networking features to enable container networking, `dockerd` directly provides some services to container networks. Principal among these is serving as a resolver, enabling service discovery (looking up other containers on the network by name), and resolution of names from an upstream resolver.

When a DNS request for a name that does not correspond to a container is received, the request is forwarded to the configured upstream resolver (by default, the host's configured resolver). This request is made from the container network namespace: the level of access and routing of traffic is the same as if the request was made by the container itself.

As a consequence of this design, containers solely attached to _internal_ network(s) will be unable to resolve names using the upstream resolver, as the container itself is unable to communicate with that nameserver. Only the names of containers also attached to the internal network are able to be resolved.

Many systems will run a local forwarding DNS resolver, typically present on a loopback address (`127.0.0.0/8`), such as systemd-resolved or dnsmasq. Common loopback address examples include `127.0.0.1` or `127.0.0.53`. As the host and any containers have separate loopback devices, a consequence of the design described above is that containers are unable to resolve names from the host's configured resolver, as they cannot reach these addresses on the host loopback device.

To bridge this gap, and to allow containers to properly resolve names even when a local forwarding resolver is used on a loopback address, `dockerd` will detect this scenario and instead forward DNS requests from the host/root network namespace. The loopback resolver will then forward the requests to its configured upstream resolvers, as expected.

## Impact

Because `dockerd` will forward DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics entirely, _internal_ networks can unexpectedly forward DNS requests to an external nameserver.

By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers. For example, if the domain `evil.example` was registered, the authoritative nameserver(s) for that domain could (eventually and indirectly) receive a request for `this-is-a-secret.evil.example`.

Docker Desktop is not affected, as Docker Desktop always runs an internal resolver on a RFC 1918 address.

## Patches

Moby releases 26.0.0-rc3, 25.0.5 (released) and 23.0.11 (to be released) are patched to prevent forwarding DNS requests from internal networks.

## Workarounds

-   Run containers intended to be solely attached to _internal_ networks with a custom upstream address (`--dns` argument to `docker run`, or API equivalent), which will force all upstream DNS queries to be resolved from the container network namespace.

## Background

- yair zak originally reported this issue to the Docker security team.
-  PR <https://github.com/moby/moby/pull/46609> was opened in public to fix this issue, as it was not originally considered to have a security implication.
- [The official documentation](https://docs.docker.com/network/drivers/ipvlan/#:~:text=If%20the%20parent,the%20network%20completely) claims that "the `--internal` flag that will completely isolate containers on a network from any communications external to that network," which necessitated this advisory and CVE.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29018.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29018
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-07T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.4975
published_at 2026-04-04T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49723
published_at 2026-04-02T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58004
published_at 2026-04-21T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.5804
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58018
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57998
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-16T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58027
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
5
reference_url https://github.com/moby/moby/pull/46609
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T19:09:14Z/
url https://github.com/moby/moby/pull/46609
6
reference_url https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T19:09:14Z/
url https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068460
reference_id 1068460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068460
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270591
reference_id 2270591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270591
9
reference_url https://usn.ubuntu.com/7161-1/
reference_id USN-7161-1
reference_type
scores
url https://usn.ubuntu.com/7161-1/
10
reference_url https://usn.ubuntu.com/7161-2/
reference_id USN-7161-2
reference_type
scores
url https://usn.ubuntu.com/7161-2/
fixed_packages
0
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
1
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9
aliases CVE-2024-29018, GHSA-mq39-4gv4-mvpx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1sky-21r5-3qcu
1
url VCID-6tg9-3vhh-muae
vulnerability_id VCID-6tg9-3vhh-muae
summary
Moby Race Condition vulnerability
moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The vulnerability could be used to trigger concurrent builds that call the EnsureLayer function resulting in resource leaks/exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36621
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16524
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16485
published_at 2026-04-18T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16465
published_at 2026-04-16T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16528
published_at 2026-04-13T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16587
published_at 2026-04-12T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16627
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16594
published_at 2026-04-08T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16648
published_at 2026-04-09T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.1671
published_at 2026-04-04T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16509
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gist.github.com/1047524396/5d44459edab5fafcdf86b43909b81135
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:13:03Z/
url https://gist.github.com/1047524396/5d44459edab5fafcdf86b43909b81135
5
reference_url https://github.com/advisories/GHSA-2mj3-vfvx-fc43
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-2mj3-vfvx-fc43
6
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
7
reference_url https://github.com/moby/moby/blob/v25.0.5/builder/builder-next/adapters/snapshot/layer.go#L24
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:13:03Z/
url https://github.com/moby/moby/blob/v25.0.5/builder/builder-next/adapters/snapshot/layer.go#L24
8
reference_url https://github.com/moby/moby/commit/37545cc644344dcb576cba67eb7b6f51a463d31e
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:13:03Z/
url https://github.com/moby/moby/commit/37545cc644344dcb576cba67eb7b6f51a463d31e
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-36621
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-36621
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2329522
reference_id 2329522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2329522
11
reference_url https://usn.ubuntu.com/7474-1/
reference_id USN-7474-1
reference_type
scores
url https://usn.ubuntu.com/7474-1/
fixed_packages
0
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
1
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9
aliases CVE-2024-36621, GHSA-2mj3-vfvx-fc43
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tg9-3vhh-muae
2
url VCID-8e1u-z6kg-ryhc
vulnerability_id VCID-8e1u-z6kg-ryhc
summary
Moby Race Condition vulnerability
moby v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36623.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36623
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17017
published_at 2026-04-21T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.1698
published_at 2026-04-18T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16976
published_at 2026-04-16T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1704
published_at 2026-04-13T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17102
published_at 2026-04-12T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17149
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17174
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17116
published_at 2026-04-08T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17025
published_at 2026-04-07T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17245
published_at 2026-04-04T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.17194
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:11:46Z/
url https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29
5
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
6
reference_url https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:11:46Z/
url https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115
7
reference_url https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:11:46Z/
url https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb
8
reference_url https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-04T17:11:46Z/
url https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-36623
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-36623
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2329519
reference_id 2329519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2329519
11
reference_url https://usn.ubuntu.com/7474-1/
reference_id USN-7474-1
reference_type
scores
url https://usn.ubuntu.com/7474-1/
fixed_packages
0
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
1
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9
aliases CVE-2024-36623, GHSA-gh5c-3h97-2f3q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1u-z6kg-ryhc
3
url VCID-b2qe-8u58-2qck
vulnerability_id VCID-b2qe-8u58-2qck
summary
IPv6 enabled on IPv4-only network interfaces
In 26.0.0 and 26.0.1, IPv6 is not disabled on network interfaces, including those belonging to networks where `--ipv6=false`.

### Impact

A container with an `ipvlan` or `macvlan` interface will normally be configured to share an external network link with the host machine. Because of this direct access, with IPv6 enabled:

- Containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses.
- If router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses.
- The interface  will be a member of IPv6 multicast groups.

This means interfaces in IPv4-only networks present an unexpectedly and unnecessarily increased attack surface.

A container with an unexpected IPv6 address can do anything a container configured with an IPv6 address can do. That is, listen for connections on its IPv6 address, open connections to other nodes on the network over IPv6, or attempt a DoS attack by flooding packets from its IPv6 address. This has CVSS score AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L (2.7).

Because the container may not be constrained by an IPv6 firewall, there is increased potential for data exfiltration from the container. This has CVSS score AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N (4.7).

A remote attacker could send malicious Router Advertisements to divert traffic to itself, a black-hole, or another device. The same attack is possible today for IPv4 macvlan/ipvlan endpoints with ARP spoofing, TLS is commonly used by Internet APIs to mitigate this risk. The presence of an IPv6 route could impact the container's availability by indirectly abusing the behaviour of software which behaves poorly in a dual-stack environment. For example, it could resolve a name to a DNS AAAA record and keep trying to connect over IPv6 without ever falling back to IPv4, potentially denying service to the container. This has CVSS score AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H (4.5).

### Patches

The issue is patched in 26.0.2.

### Workarounds

To completely disable IPv6 in a container, use `--sysctl=net.ipv6.conf.all.disable_ipv6=1` in the `docker create` or `docker run` command. Or, in the service configuration of a `compose` file, the equivalent:

```
        sysctls:
            - net.ipv6.conf.all.disable_ipv6=1
```

### References

- sysctl configuration using `docker run`:
  - https://docs.docker.com/reference/cli/docker/container/run/#sysctl
- sysctl configuration using `docker compose`:
  - https://docs.docker.com/compose/compose-file/compose-file-v3/#sysctls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32473.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32473.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-32473
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26254
published_at 2026-04-21T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.2629
published_at 2026-04-18T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26317
published_at 2026-04-16T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26307
published_at 2026-04-13T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26366
published_at 2026-04-12T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26412
published_at 2026-04-11T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26403
published_at 2026-04-09T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26353
published_at 2026-04-08T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26286
published_at 2026-04-07T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26467
published_at 2026-04-02T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.2651
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-32473
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32473
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
5
reference_url https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T13:58:32Z/
url https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642
6
reference_url https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T13:58:32Z/
url https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-32473
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-32473
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070378
reference_id 1070378
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070378
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2276026
reference_id 2276026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2276026
fixed_packages
0
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
1
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9
aliases CVE-2024-32473, GHSA-x84c-p2g9-rqv9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2qe-8u58-2qck
4
url VCID-njcw-wc13-dqcz
vulnerability_id VCID-njcw-wc13-dqcz
summary
Classic builder cache poisoning
The classic builder cache system is prone to cache poisoning if the image is built `FROM scratch`.
Also, changes to some instructions (most important being `HEALTHCHECK` and `ONBUILD`) would not cause a cache miss.


An attacker with the knowledge of the Dockerfile someone is using could poison their cache by making them pull a specially crafted image that would be considered as a valid cache candidate for some build steps.

For example, an attacker could create an image that is considered as a valid cache candidate for:
```
FROM scratch
MAINTAINER Pawel
```

when in fact the malicious image used as a cache would be an image built from a different Dockerfile.

In the second case, the attacker could for example substitute a different `HEALTCHECK` command.


### Impact

23.0+ users are only affected if they explicitly opted out of Buildkit (`DOCKER_BUILDKIT=0` environment variable) or are using the `/build` API endpoint (which uses the classic builder by default).

All users on versions older than 23.0 could be impacted. An example could be a CI with a shared cache, or just a regular Docker user pulling a malicious image due to misspelling/typosquatting.

Image build API endpoint (`/build`) and `ImageBuild` function from `github.com/docker/docker/client` is also affected as it the uses classic builder by default. 


### Patches

Patches are included in Moby releases:

- v25.0.2
- v24.0.9
- v23.0.10

### Workarounds

- Use `--no-cache` or use Buildkit if possible (`DOCKER_BUILDKIT=1`, it's default on 23.0+ assuming that the buildx plugin is installed).
- Use `Version = types.BuilderBuildKit` or `NoCache = true` in `ImageBuildOptions` for `ImageBuild` call.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24557.json
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24557.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24557
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24292
published_at 2026-04-21T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24317
published_at 2026-04-18T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24328
published_at 2026-04-16T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.2431
published_at 2026-04-13T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24367
published_at 2026-04-12T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-11T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24392
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24348
published_at 2026-04-08T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24281
published_at 2026-04-07T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24498
published_at 2026-04-04T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24464
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24557
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24557
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
5
reference_url https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:20:50Z/
url https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae
6
reference_url https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd
7
reference_url https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff
8
reference_url https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:20:50Z/
url https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-24557
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-24557
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071745
reference_id 1071745
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071745
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262352
reference_id 2262352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262352
12
reference_url https://security.gentoo.org/glsa/202409-29
reference_id GLSA-202409-29
reference_type
scores
url https://security.gentoo.org/glsa/202409-29
13
reference_url https://access.redhat.com/errata/RHSA-2025:11749
reference_id RHSA-2025:11749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11749
14
reference_url https://access.redhat.com/errata/RHSA-2025:9340
reference_id RHSA-2025:9340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9340
fixed_packages
0
url pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
purl pkg:deb/debian/docker.io@20.10.24%2Bdfsg1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@20.10.24%252Bdfsg1-1
1
url pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
purl pkg:deb/debian/docker.io@26.1.5%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9
aliases CVE-2024-24557, GHSA-xw73-rw38-6vjc
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njcw-wc13-dqcz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/docker.io@26.1.5%252Bdfsg1-9