Search for packages
| purl | pkg:deb/debian/docker.io@1.3.3~dfsg1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8uuk-1592-syg2 | Path Traversal in Docker Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. |
CVE-2014-9356
GHSA-vj3f-3286-r4pf |
| VCID-cey6-s9jk-s7cf | Arbitrary Code Execution Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. |
CVE-2014-9357
GHSA-997c-fj8j-rq5h |
| VCID-gsez-t7u3-dubr | Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." |
CVE-2014-9358
GHSA-qmmc-jppf-32wv |