Search for packages
| purl | pkg:alpm/archlinux/docker@1:20.10.2-4 |
| Next non-vulnerable version | 1:20.10.3-1 |
| Latest non-vulnerable version | 1:20.10.11-1 |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gund-83cy-9fap
Aliases: CVE-2021-21284 GHSA-7452-xqpj-6rpc |
moby Access to remapped root allows privilege escalation to real root ### Impact When using `--userns-remap`, if the root user in the remapped namespace has access to the host filesystem they can modify files under `/var/lib/docker/<remapping>` that cause writing files with extended privileges. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. ### Credits Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @bassmatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to security@docker.com |
Affected by 0 other vulnerabilities. |
|
VCID-uckr-kzdf-7ydj
Aliases: CVE-2021-21285 GHSA-6fj5-m822-rqx8 |
moby docker daemon crash during image pull of malicious image ### Impact Pulling an intentionally malformed Docker image manifest crashes the `dockerd` daemon. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. ### Credits Maintainers would like to thank Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune for working on the vulnerability and Brad Geesaman for responsibly disclosing it to security@docker.com. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:26:55.799358+00:00 | Arch Linux Importer | Affected by | VCID-gund-83cy-9fap | https://security.archlinux.org/AVG-1528 | 38.0.0 |
| 2026-04-01T18:26:55.774309+00:00 | Arch Linux Importer | Affected by | VCID-uckr-kzdf-7ydj | https://security.archlinux.org/AVG-1528 | 38.0.0 |