Search for packages
| purl | pkg:deb/debian/docker.io@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-14uu-1w2t-ekh2 | docker: Security regression of CVE-2016-9962 due to inclusion of vulnerable runc |
CVE-2020-14300
|
| VCID-2hy3-uwad-mydt | Privilege Escalation in Docker Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. |
CVE-2014-3499
GHSA-wxj3-qwv4-cvfm |
| VCID-2ttv-me4k-z7hx | Path Traversal in Moby builder util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call. |
CVE-2020-27534
GHSA-6hwg-w5jg-9c6x |
| VCID-5syq-v7xj-zqcv | docker: Security regression of CVE-2019-5736 due to inclusion of vulnerable runc |
CVE-2020-14298
|
| VCID-9zkj-h3wh-afb6 | docker: regression of CVE-2014-5277 |
CVE-2015-1843
|
| VCID-au62-jayw-u7hx | docker: DoS via repeatedly joining and quitting swarm cluster as a node |
CVE-2016-6595
|
| VCID-evqv-4z17-kkcz | NULL Pointer Dereference on moby image history moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go. |
CVE-2024-36620
GHSA-q59j-vv4j-v33c |
| VCID-jgyp-7k51-1uda | Moby firewalld reload makes published container ports accessible from remote hosts Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (dockerd), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as Docker, or Docker Engine. Firewalld is a daemon used by some Linux distributions to provide a dynamically managed firewall. When Firewalld is running, Docker uses its iptables backend to create rules, including rules to isolate containers in one bridge network from containers in other bridge networks. ### Impact The iptables rules created by Docker are removed when firewalld is reloaded using, for example "firewall-cmd --reload", "killall -HUP firewalld", or "systemctl reload firewalld". When that happens, Docker must re-create the rules. However, in affected versions of Docker, the iptables rules that prevent packets arriving on a host interface from reaching container addresses are not re-created. Once these rules have been removed, a remote host configured with a route to a Docker bridge network can access published ports, even when those ports were only published to a loopback address. Unpublished ports remain inaccessible. For example, following a firewalld reload on a Docker host with address `192.168.0.10` and a bridge network with subnet `172.17.0.0/16`, running the following command on another host in the local network will give it access to published ports on container addresses in that network: `ip route add 172.17.0.0/16 via 192.168.0.10`. Containers running in networks created with `--internal` or equivalent have no access to other networks. Containers that are only connected to these networks remain isolated after a firewalld reload. Where Docker Engine is not running in the host's network namespace, it is unaffected. Including, for example, Rootless Mode, and Docker Desktop. ### Patches Moby releases older than 28.2.0 are not affected. A fix is available in moby release 28.3.3. ### Workarounds After reloading firewalld, either: - Restart the docker daemon, - Re-create bridge networks, or - Use rootless mode. ### References https://firewalld.org/ https://firewalld.org/documentation/howto/reload-firewalld.html |
CVE-2025-54388
GHSA-x4rx-4gw3-53p4 |
| VCID-vkba-amt4-m7e6 | Privilege Elevation in runc libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. |
CVE-2016-3697
GHSA-q3j5-32m5-58c2 |
| VCID-w4uc-6mvs-u3g7 | Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command. |
CVE-2019-15752
|
| VCID-y6tt-h3zz-ukev | docker: Ambient capability usage in containers |
CVE-2016-8867
|