Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/docker.io@0?distro=trixie
purl pkg:deb/debian/docker.io@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (11)
Vulnerability Summary Aliases
VCID-14uu-1w2t-ekh2 docker: Security regression of CVE-2016-9962 due to inclusion of vulnerable runc CVE-2020-14300
VCID-2hy3-uwad-mydt Privilege Escalation in Docker Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. CVE-2014-3499
GHSA-wxj3-qwv4-cvfm
VCID-2ttv-me4k-z7hx Path Traversal in Moby builder util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call. CVE-2020-27534
GHSA-6hwg-w5jg-9c6x
VCID-5syq-v7xj-zqcv docker: Security regression of CVE-2019-5736 due to inclusion of vulnerable runc CVE-2020-14298
VCID-9zkj-h3wh-afb6 docker: regression of CVE-2014-5277 CVE-2015-1843
VCID-au62-jayw-u7hx docker: DoS via repeatedly joining and quitting swarm cluster as a node CVE-2016-6595
VCID-evqv-4z17-kkcz NULL Pointer Dereference on moby image history moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go. CVE-2024-36620
GHSA-q59j-vv4j-v33c
VCID-jgyp-7k51-1uda Moby firewalld reload makes published container ports accessible from remote hosts Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (dockerd), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as Docker, or Docker Engine. Firewalld is a daemon used by some Linux distributions to provide a dynamically managed firewall. When Firewalld is running, Docker uses its iptables backend to create rules, including rules to isolate containers in one bridge network from containers in other bridge networks. ### Impact The iptables rules created by Docker are removed when firewalld is reloaded using, for example "firewall-cmd --reload", "killall -HUP firewalld", or "systemctl reload firewalld". When that happens, Docker must re-create the rules. However, in affected versions of Docker, the iptables rules that prevent packets arriving on a host interface from reaching container addresses are not re-created. Once these rules have been removed, a remote host configured with a route to a Docker bridge network can access published ports, even when those ports were only published to a loopback address. Unpublished ports remain inaccessible. For example, following a firewalld reload on a Docker host with address `192.168.0.10` and a bridge network with subnet `172.17.0.0/16`, running the following command on another host in the local network will give it access to published ports on container addresses in that network: `ip route add 172.17.0.0/16 via 192.168.0.10`. Containers running in networks created with `--internal` or equivalent have no access to other networks. Containers that are only connected to these networks remain isolated after a firewalld reload. Where Docker Engine is not running in the host's network namespace, it is unaffected. Including, for example, Rootless Mode, and Docker Desktop. ### Patches Moby releases older than 28.2.0 are not affected. A fix is available in moby release 28.3.3. ### Workarounds After reloading firewalld, either: - Restart the docker daemon, - Re-create bridge networks, or - Use rootless mode. ### References https://firewalld.org/ https://firewalld.org/documentation/howto/reload-firewalld.html CVE-2025-54388
GHSA-x4rx-4gw3-53p4
VCID-vkba-amt4-m7e6 Privilege Elevation in runc libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. CVE-2016-3697
GHSA-q3j5-32m5-58c2
VCID-w4uc-6mvs-u3g7 Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command. CVE-2019-15752
VCID-y6tt-h3zz-ukev docker: Ambient capability usage in containers CVE-2016-8867

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:06:35.286472+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:44:04.001034+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:35.364505+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:25.673866+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:35.694302+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:33.056416+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:59.916554+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:39.125642+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:58.881657+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:05.703260+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:44.898809+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:00:52.522560+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:54.017147+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:32.208816+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:59.537439+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:53.869663+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:02.458947+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:41.603844+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:11.430314+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:44.096228+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:35.652592+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:22.806969+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:17:19.787999+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:01.293036+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:43.267702+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:09.050429+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:20.121903+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:18.955156+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:01.714693+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:49.222797+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:45.601303+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:17.155876+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:16.181072+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.1.0