Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/docker.io@20.10.5%2Bdfsg1-1%2Bdeb11u2?distro=trixie
Next non-vulnerable version 20.10.5+dfsg1-1+deb11u3
Latest non-vulnerable version 28.5.2+dfsg3-2
Risk 4.0
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-1sky-21r5-3qcu
Aliases:
CVE-2024-29018
GHSA-mq39-4gv4-mvpx
Moby's external DNS requests from 'internal' networks could lead to data exfiltration Moby is an open source container framework originally developed by Docker Inc. as Docker. It is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. As a batteries-included container runtime, Moby comes with a built-in networking implementation that enables communication between containers, and between containers and external resources. Moby's networking implementation allows for creating and using many networks, each with their own subnet and gateway. This feature is frequently referred to as custom networks, as each network can have a different driver, set of parameters, and thus behaviors. When creating a network, the `--internal` flag is used to designate a network as _internal_. The `internal` attribute in a docker-compose.yml file may also be used to mark a network _internal_, and other API clients may specify the `internal` parameter as well. When containers with networking are created, they are assigned unique network interfaces and IP addresses (typically from a non-routable [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) subnet). The root network namespace (hereafter referred to as the 'host') serves as a router for non-internal networks, with a gateway IP that provides SNAT/DNAT to/from container IPs. Containers on an _internal_ network may communicate between each other, but are precluded from communicating with any networks the host has access to (LAN or WAN) as no default route is configured, and firewall rules are set up to drop all outgoing traffic. Communication with the gateway IP address (and thus appropriately configured host services) is possible, and the host may communicate with any container IP directly. In addition to configuring the Linux kernel's various networking features to enable container networking, `dockerd` directly provides some services to container networks. Principal among these is serving as a resolver, enabling service discovery (looking up other containers on the network by name), and resolution of names from an upstream resolver. When a DNS request for a name that does not correspond to a container is received, the request is forwarded to the configured upstream resolver (by default, the host's configured resolver). This request is made from the container network namespace: the level of access and routing of traffic is the same as if the request was made by the container itself. As a consequence of this design, containers solely attached to _internal_ network(s) will be unable to resolve names using the upstream resolver, as the container itself is unable to communicate with that nameserver. Only the names of containers also attached to the internal network are able to be resolved. Many systems will run a local forwarding DNS resolver, typically present on a loopback address (`127.0.0.0/8`), such as systemd-resolved or dnsmasq. Common loopback address examples include `127.0.0.1` or `127.0.0.53`. As the host and any containers have separate loopback devices, a consequence of the design described above is that containers are unable to resolve names from the host's configured resolver, as they cannot reach these addresses on the host loopback device. To bridge this gap, and to allow containers to properly resolve names even when a local forwarding resolver is used on a loopback address, `dockerd` will detect this scenario and instead forward DNS requests from the host/root network namespace. The loopback resolver will then forward the requests to its configured upstream resolvers, as expected. ## Impact Because `dockerd` will forward DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics entirely, _internal_ networks can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers. For example, if the domain `evil.example` was registered, the authoritative nameserver(s) for that domain could (eventually and indirectly) receive a request for `this-is-a-secret.evil.example`. Docker Desktop is not affected, as Docker Desktop always runs an internal resolver on a RFC 1918 address. ## Patches Moby releases 26.0.0-rc3, 25.0.5 (released) and 23.0.11 (to be released) are patched to prevent forwarding DNS requests from internal networks. ## Workarounds - Run containers intended to be solely attached to _internal_ networks with a custom upstream address (`--dns` argument to `docker run`, or API equivalent), which will force all upstream DNS queries to be resolved from the container network namespace. ## Background - yair zak originally reported this issue to the Docker security team. - PR <https://github.com/moby/moby/pull/46609> was opened in public to fix this issue, as it was not originally considered to have a security implication. - [The official documentation](https://docs.docker.com/network/drivers/ipvlan/#:~:text=If%20the%20parent,the%20network%20completely) claims that "the `--internal` flag that will completely isolate containers on a network from any communications external to that network," which necessitated this advisory and CVE.
26.1.4+dfsg1-9
Affected by 0 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-6tg9-3vhh-muae
Aliases:
CVE-2024-36621
GHSA-2mj3-vfvx-fc43
Moby Race Condition vulnerability moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The vulnerability could be used to trigger concurrent builds that call the EnsureLayer function resulting in resource leaks/exhaustion.
26.1.4+dfsg1-9
Affected by 0 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-8e1u-z6kg-ryhc
Aliases:
CVE-2024-36623
GHSA-gh5c-3h97-2f3q
Moby Race Condition vulnerability moby v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
26.1.4+dfsg1-9
Affected by 0 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-avqu-wswg-c3ga
Aliases:
CVE-2022-36109
GHSA-rc4r-wh2q-q6c4
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Users should update to this version when it is available. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly. Thanks to Steven Murdoch for reporting this issue. ---- ### Impact If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. ### Patches This bug is fixed in Moby (Docker Engine) 20.10.18. Users should update to this version when it is available. ### Workarounds This problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly. ### References https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/moby/moby/issues/new) * Email us at [security@docker.com](mailto:security@docker.com)
20.10.19+dfsg1-1
Affected by 0 other vulnerabilities.
20.10.24+dfsg1-1+deb12u1
Affected by 5 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-b2qe-8u58-2qck
Aliases:
CVE-2024-32473
GHSA-x84c-p2g9-rqv9
IPv6 enabled on IPv4-only network interfaces In 26.0.0 and 26.0.1, IPv6 is not disabled on network interfaces, including those belonging to networks where `--ipv6=false`. ### Impact A container with an `ipvlan` or `macvlan` interface will normally be configured to share an external network link with the host machine. Because of this direct access, with IPv6 enabled: - Containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses. - If router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses. - The interface will be a member of IPv6 multicast groups. This means interfaces in IPv4-only networks present an unexpectedly and unnecessarily increased attack surface. A container with an unexpected IPv6 address can do anything a container configured with an IPv6 address can do. That is, listen for connections on its IPv6 address, open connections to other nodes on the network over IPv6, or attempt a DoS attack by flooding packets from its IPv6 address. This has CVSS score AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L (2.7). Because the container may not be constrained by an IPv6 firewall, there is increased potential for data exfiltration from the container. This has CVSS score AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N (4.7). A remote attacker could send malicious Router Advertisements to divert traffic to itself, a black-hole, or another device. The same attack is possible today for IPv4 macvlan/ipvlan endpoints with ARP spoofing, TLS is commonly used by Internet APIs to mitigate this risk. The presence of an IPv6 route could impact the container's availability by indirectly abusing the behaviour of software which behaves poorly in a dual-stack environment. For example, it could resolve a name to a DNS AAAA record and keep trying to connect over IPv6 without ever falling back to IPv4, potentially denying service to the container. This has CVSS score AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H (4.5). ### Patches The issue is patched in 26.0.2. ### Workarounds To completely disable IPv6 in a container, use `--sysctl=net.ipv6.conf.all.disable_ipv6=1` in the `docker create` or `docker run` command. Or, in the service configuration of a `compose` file, the equivalent: ``` sysctls: - net.ipv6.conf.all.disable_ipv6=1 ``` ### References - sysctl configuration using `docker run`: - https://docs.docker.com/reference/cli/docker/container/run/#sysctl - sysctl configuration using `docker compose`: - https://docs.docker.com/compose/compose-file/compose-file-v3/#sysctls
26.1.4+dfsg1-9
Affected by 0 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-bzeb-kj67-vfds
Aliases:
CVE-2023-28840
GHSA-232p-vwff-86mp
Docker Swarm encrypted overlay network may be unauthenticated [Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. [Two iptables rules](https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L230-L234) serve to filter incoming VXLAN datagrams with a VNI that corresponds to an encrypted network and discards unencrypted datagrams. The rules are appended to the end of the `INPUT` filter chain, following any rules that have been previously set by the system administrator. Administrator-set rules take precedence over the rules Moby sets to discard unencrypted VXLAN datagrams, which can potentially admit unencrypted datagrams that should have been discarded. On Red Hat Enterprise Linux and derivatives such as CentOS and Rocky, the `xt_u32` module has been: * [moved to the kernel-modules-extra package and no longer installed by default in RHEL 8.3](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/rhel-8-3-0-release#technology-preview_networking) * [officially deprecated in RHEL 8.6](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/deprecated_functionality#deprecated-functionality_networking) * [removed completely in RHEL 9](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_networking_considerations-in-adopting-rhel-9#ref_firewall-networking_assembly_networking) These rules are not created when `xt_u32` is unavailable, even though the container is still attached to the network. ## Impact Encrypted overlay networks on affected configurations silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The injection of arbitrary Ethernet frames can enable a Denial of Service attack. A sophisticated attacker may be able to establish a UDP or TCP connection by way of the container’s outbound gateway that would otherwise be blocked by a stateful firewall, or carry out other escalations beyond simple injection by smuggling packets into the overlay network. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * Close the VXLAN port (by default, UDP port 4789) to incoming traffic at the Internet boundary (see [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)) to prevent all VXLAN packet injection. * Ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. ## Background * [#43382](https://github.com/moby/moby/issues/43382) partially discussed this concern, but did not consider the security implications. * Mirantis FIELD-5788 essentially duplicates [#43382](https://github.com/moby/moby/issues/43382), and was created six months earlier; it similarly overlooked the security implications. * [#45118](https://github.com/moby/moby/pull/45118) is the ancestor of the final patches, and was where the security implications were discovered. ## Related * [CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237) * [CVE-2023-28842: Encrypted overlay network with a single endpoint is unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
20.10.24+dfsg1-1
Affected by 0 other vulnerabilities.
20.10.24+dfsg1-1+deb12u1
Affected by 5 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-e82r-vc77-f7bz
Aliases:
CVE-2023-28842
GHSA-6wrf-mxfj-pf5p
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated [Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate. ## Impact Encrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) should be referenced for a deeper exploration. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * In multi-node clusters, deploy a global ‘pause’ container for each encrypted overlay network, on every node. For example, use the `registry.k8s.io/pause` image and a `--mode global` service. * For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features. The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network. * If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec. For example, `iptables -A INPUT -m udp —-dport 4789 -m policy --dir in --pol none -j DROP`. ## Background * This issue was discovered while characterizing and mitigating [CVE-2023-28840](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) and [CVE-2023-28841](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237). ## Related * [CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237) * [CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
20.10.24+dfsg1-1
Affected by 0 other vulnerabilities.
20.10.24+dfsg1-1+deb12u1
Affected by 5 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-njcw-wc13-dqcz
Aliases:
CVE-2024-24557
GHSA-xw73-rw38-6vjc
Classic builder cache poisoning The classic builder cache system is prone to cache poisoning if the image is built `FROM scratch`. Also, changes to some instructions (most important being `HEALTHCHECK` and `ONBUILD`) would not cause a cache miss. An attacker with the knowledge of the Dockerfile someone is using could poison their cache by making them pull a specially crafted image that would be considered as a valid cache candidate for some build steps. For example, an attacker could create an image that is considered as a valid cache candidate for: ``` FROM scratch MAINTAINER Pawel ``` when in fact the malicious image used as a cache would be an image built from a different Dockerfile. In the second case, the attacker could for example substitute a different `HEALTCHECK` command. ### Impact 23.0+ users are only affected if they explicitly opted out of Buildkit (`DOCKER_BUILDKIT=0` environment variable) or are using the `/build` API endpoint (which uses the classic builder by default). All users on versions older than 23.0 could be impacted. An example could be a CI with a shared cache, or just a regular Docker user pulling a malicious image due to misspelling/typosquatting. Image build API endpoint (`/build`) and `ImageBuild` function from `github.com/docker/docker/client` is also affected as it the uses classic builder by default. ### Patches Patches are included in Moby releases: - v25.0.2 - v24.0.9 - v23.0.10 ### Workarounds - Use `--no-cache` or use Buildkit if possible (`DOCKER_BUILDKIT=1`, it's default on 23.0+ assuming that the buildx plugin is installed). - Use `Version = types.BuilderBuildKit` or `NoCache = true` in `ImageBuildOptions` for `ImageBuild` call.
26.1.4+dfsg1-9
Affected by 0 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
VCID-quyf-eq2s-dbda
Aliases:
CVE-2023-28841
GHSA-33pg-m6jh-5237
Docker Swarm encrypted overlay network traffic may be unencrypted [Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. An [iptables rule](https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L205-L207) designates outgoing VXLAN datagrams with a VNI that corresponds to an encrypted overlay network for IPsec encapsulation. On Red Hat Enterprise Linux and derivatives such as CentOS and Rocky, the `xt_u32` module has been: * [moved to the kernel-modules-extra package and no longer installed by default in RHEL 8.3](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/rhel-8-3-0-release#technology-preview_networking) * [officially deprecated in RHEL 8.6](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/deprecated_functionality#deprecated-functionality_networking) * [removed completely in RHEL 9](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_networking_considerations-in-adopting-rhel-9#ref_firewall-networking_assembly_networking) This rule is not created when `xt_u32` is unavailable, even though the container is still attached to the network. ## Impact Encrypted overlay networks on affected platforms silently transmit unencrypted data. As a result, `overlay` networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees. It is possible for an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network, resulting in unexpected secrets or user data disclosure. Thus, because many database protocols, internal APIs, etc. are not protected by a second layer of encryption, a user may rely on Swarm encrypted overlay networks to provide confidentiality, which due to this vulnerability is no longer guaranteed. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary (see [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)) in order to prevent unintentionally leaking unencrypted traffic over the Internet. * Ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. ## Background * [#43382 ](https://github.com/moby/moby/issues/43382)partially discussed this concern, but did not consider the security implications. * Mirantis FIELD-5788 essentially duplicates [#43382](https://github.com/moby/moby/issues/43382), and was created six months earlier; it similarly overlooked the security implications. * [#45118](https://github.com/moby/moby/pull/45118) is the ancestor of the final patches, and was where the security implications were discovered. ## Related * [CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) * [CVE-2023-28842: Encrypted overlay network with a single endpoint is unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
20.10.24+dfsg1-1
Affected by 0 other vulnerabilities.
20.10.24+dfsg1-1+deb12u1
Affected by 5 other vulnerabilities.
26.1.5+dfsg1-9
Affected by 0 other vulnerabilities.
28.5.2+dfsg3-2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (46)
Vulnerability Summary Aliases
VCID-14uu-1w2t-ekh2 docker: Security regression of CVE-2016-9962 due to inclusion of vulnerable runc CVE-2020-14300
VCID-165g-hgmx-nybk Information Exposure in RunC RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. CVE-2016-9962
GHSA-gp4j-w3vj-7299
VCID-2hy3-uwad-mydt Privilege Escalation in Docker Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. CVE-2014-3499
GHSA-wxj3-qwv4-cvfm
VCID-2ttv-me4k-z7hx Path Traversal in Moby builder util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call. CVE-2020-27534
GHSA-6hwg-w5jg-9c6x
VCID-3eju-5upk-auhy `docker cp` allows unexpected chmod of host files in Moby Docker Engine ## Impact A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host’s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. ## Patches This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted. ## Workarounds Ensure you only run trusted containers. ## Credits The Moby project would like to thank Lei Wang and Ruizhi Xiao for responsibly disclosing this issue in accordance with the [Moby security policy](https://github.com/moby/moby/blob/master/SECURITY.md). ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/moby/moby/issues/new) * Email us at  security@docker.com  if you think you’ve found a security bug CVE-2021-41089
GHSA-v994-f8vw-g7j4
VCID-41ft-14gt-bbbq Authz zero length regression A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low. This advisory outlines the issue, identifies the affected versions, and provides remediation steps for impacted users. ### Impact Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an [authorization plugin](https://docs.docker.com/engine/extend/plugins_authorization/) without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine [v18.09.1](https://docs.docker.com/engine/release-notes/18.09/#security-fixes-1) in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted. Docker EE v19.03.x and all versions of Mirantis Container Runtime **are not vulnerable.** ### Vulnerability details - **AuthZ bypass and privilege escalation:** An attacker could exploit a bypass using an API request with Content-Length set to 0, causing the Docker daemon to forward the request without the body to the AuthZ plugin, which might approve the request incorrectly. - **Initial fix:** The issue was fixed in Docker Engine [v18.09.1](https://docs.docker.com/engine/release-notes/18.09/#security-fixes-1) January 2019.. - **Regression:** The fix was not included in Docker Engine v19.03 or newer versions. This was identified in April 2024 and patches were released for the affected versions on July 23, 2024. The issue was assigned [CVE-2024-41110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41110). ### Patches - docker-ce v27.1.1 containes patches to fix the vulnerability. - Patches have also been merged into the master, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. ### Remediation steps - If you are running an affected version, update to the most recent patched version. - Mitigation if unable to update immediately: - Avoid using AuthZ plugins. - Restrict access to the Docker API to trusted parties, following the principle of least privilege. ### References - https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb - https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1 - https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin/ CVE-2024-41110
GHSA-v23v-6jw2-98fq
VCID-43es-2d6x-jba8 docker: container breakout without selinux in enforcing mode CVE-2018-10892
VCID-4mf3-mmz6-2kfs Information Exposure in Docker Engine Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. CVE-2015-3630
GHSA-8fvr-5rqf-3wwh
VCID-5syq-v7xj-zqcv docker: Security regression of CVE-2019-5736 due to inclusion of vulnerable runc CVE-2020-14298
VCID-6gxe-db4h-93ex Symlink Attack in Libcontainer and Docker Engine Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image. CVE-2015-3627
GHSA-g7v2-2qxx-wjrw
VCID-6vru-hsfs-rufg Multiple vulnerabilities have been found in containerd, the worst of which could result in privilege escalation. CVE-2020-15257
GHSA-36xw-fx78-c5r4
VCID-7z14-w8da-rufv docker: tagging image to ID can redirect images on subsequent pulls CVE-2014-5282
VCID-8uuk-1592-syg2 Path Traversal in Docker Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. CVE-2014-9356
GHSA-vj3f-3286-r4pf
VCID-9zkj-h3wh-afb6 docker: regression of CVE-2014-5277 CVE-2015-1843
VCID-ahbf-gwnw-nufp Docker Moby /proc/scsi Path Exposure Allows Host Data Loss (SCSI MICDROP) The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP. CVE-2017-16539
GHSA-vfjc-2qcw-j95j
VCID-au62-jayw-u7hx docker: DoS via repeatedly joining and quitting swarm cluster as a node CVE-2016-6595
VCID-bhju-575k-ebh3 Docker CLI leaks private registry credentials to registry-1.docker.io ## Impact A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. ## Patches This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. ## Workarounds Ensure that any configured `credsStore` or `credHelpers` entries in the configuration file reference an installed credential helper that is executable and on the `PATH`. ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/docker/cli/issues/new/choose) * Email us at security@docker.com if you think you’ve found a security bug CVE-2021-41092
GHSA-99pg-grm5-qq3v
VCID-cey6-s9jk-s7cf Arbitrary Code Execution Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. CVE-2014-9357
GHSA-997c-fj8j-rq5h
VCID-e6sp-khpk-r3d8 docker: Manifest validation and parsing logic errors allow pull-by-digest validation bypass CVE-2014-8179
VCID-e9ng-x516-53cf Moby (Docker Engine) Insufficiently restricted permissions on data directory ## Impact A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. ## Patches This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. ## Workarounds Limit access to the host to trusted users. Limit access to host volumes to trusted containers. ## Credits The Moby project would like to thank Joan Bruguera for responsibly disclosing this issue in accordance with the [Moby security policy](https://github.com/moby/moby/blob/master/SECURITY.md). ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/moby/moby/issues/new) * Email us at security@docker.com if you think you’ve found a security bug CVE-2021-41091
GHSA-3fwx-pjgw-3558
VCID-eb24-pguf-ryg1 tar-split memory exhaustion Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing. CVE-2017-14992
GHSA-hqwh-8xv9-42hw
VCID-evqv-4z17-kkcz NULL Pointer Dereference on moby image history moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go. CVE-2024-36620
GHSA-q59j-vv4j-v33c
VCID-f31s-pxtj-6uej Access Restriction Bypass in Docker Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image. CVE-2014-6408
GHSA-44gg-pmqr-4669
VCID-f6d3-yyvz-xqgs docker: Memory exhaustion via large integer used with --cpuset-mems or --cpuset-cpus CVE-2018-20699
VCID-gbw6-3a59-mbhu containerd v1.2.x can be coerced into leaking credentials during image pull ## Impact If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been rated by the containerd maintainers as medium, with a CVSS score of 6.1 and a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N. ## Patches This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. ## Workarounds If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected. ## Credits The containerd maintainers would like to thank Brad Geesaman, Josh Larsen, Ian Coldwater, Duffie Cooley, and Rory McCune for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/master/SECURITY.md). CVE-2020-15157
GHSA-742w-89gc-8m9c
VCID-gsez-t7u3-dubr Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." CVE-2014-9358
GHSA-qmmc-jppf-32wv
VCID-gund-83cy-9fap moby Access to remapped root allows privilege escalation to real root ### Impact When using `--userns-remap`, if the root user in the remapped namespace has access to the host filesystem they can modify files under `/var/lib/docker/<remapping>` that cause writing files with extended privileges. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. ### Credits Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @bassmatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to security@docker.com CVE-2021-21284
GHSA-7452-xqpj-6rpc
VCID-h83p-v26k-s7fa A flaw in Docker allowed possible information leakage. CVE-2020-13401
GHSA-qrrc-ww9x-r43g
VCID-jgyp-7k51-1uda Moby firewalld reload makes published container ports accessible from remote hosts Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (dockerd), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as Docker, or Docker Engine. Firewalld is a daemon used by some Linux distributions to provide a dynamically managed firewall. When Firewalld is running, Docker uses its iptables backend to create rules, including rules to isolate containers in one bridge network from containers in other bridge networks. ### Impact The iptables rules created by Docker are removed when firewalld is reloaded using, for example "firewall-cmd --reload", "killall -HUP firewalld", or "systemctl reload firewalld". When that happens, Docker must re-create the rules. However, in affected versions of Docker, the iptables rules that prevent packets arriving on a host interface from reaching container addresses are not re-created. Once these rules have been removed, a remote host configured with a route to a Docker bridge network can access published ports, even when those ports were only published to a loopback address. Unpublished ports remain inaccessible. For example, following a firewalld reload on a Docker host with address `192.168.0.10` and a bridge network with subnet `172.17.0.0/16`, running the following command on another host in the local network will give it access to published ports on container addresses in that network: `ip route add 172.17.0.0/16 via 192.168.0.10`. Containers running in networks created with `--internal` or equivalent have no access to other networks. Containers that are only connected to these networks remain isolated after a firewalld reload. Where Docker Engine is not running in the host's network namespace, it is unaffected. Including, for example, Rootless Mode, and Docker Desktop. ### Patches Moby releases older than 28.2.0 are not affected. A fix is available in moby release 28.3.3. ### Workarounds After reloading firewalld, either: - Restart the docker daemon, - Re-create bridge networks, or - Use rootless mode. ### References https://firewalld.org/ https://firewalld.org/documentation/howto/reload-firewalld.html CVE-2025-54388
GHSA-x4rx-4gw3-53p4
VCID-k8uy-g29x-hkht A vulnerability exists in Docker before 1.2 via container names, which may collide with and override container IDs. CVE-2014-5278
VCID-ksbt-33eq-93c9 Arbitrary File Write in Libcontainer Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container. CVE-2015-3629
GHSA-g44j-7vp3-68cv
VCID-m45k-qc4s-dycq Docker: multiple files downloaded over HTTP and executed or used unsafely CVE-2014-0048
VCID-nkhu-t2nh-s7b2 Arbitrary File Override in Docker Engine Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. CVE-2015-3631
GHSA-v4h8-794j-g8mm
VCID-pevy-d197-zydv Moby Docker cp broken with debian containers In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container. CVE-2019-14271
GHSA-v2cv-wwxq-qq97
VCID-pnva-j5xs-7udv Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. CVE-2014-5277
GHSA-8w94-cf6g-c8mg
GO-2022-0636
PYSEC-2014-80
VCID-qwqe-27yu-8kds Docker Authentication Bypass An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate. CVE-2018-12608
GHSA-qrqr-3x5j-2xw9
VCID-qxhd-hnja-2qad Docker: multiple temporary file creation vulnerabilities CVE-2014-0047
VCID-sh5d-p485-6qh4 docker: symlink-exchange race attacks in docker cp CVE-2018-15664
VCID-smxj-2zhy-yycc Arbitrary Code Execution in Docker Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. CVE-2014-6407
GHSA-5qgp-p5jc-w2rm
VCID-su25-rgw1-xkg6 docker: Attacker controlled layer IDs lead to local graph content poisoning CVE-2014-8178
VCID-u44m-mgza-nfcx Secret insertion into debug log in Docker In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret. CVE-2019-13509
GHSA-j249-ghv5-7mxv
VCID-uckr-kzdf-7ydj moby docker daemon crash during image pull of malicious image ### Impact Pulling an intentionally malformed Docker image manifest crashes the `dockerd` daemon. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. ### Credits Maintainers would like to thank Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune for working on the vulnerability and Brad Geesaman for responsibly disclosing it to security@docker.com. CVE-2021-21285
GHSA-6fj5-m822-rqx8
VCID-vkba-amt4-m7e6 Privilege Elevation in runc libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. CVE-2016-3697
GHSA-q3j5-32m5-58c2
VCID-w4uc-6mvs-u3g7 Docker Desktop Community Edition before 2.1.0.1 allows local users to gain privileges by placing a Trojan horse docker-credential-wincred.exe file in %PROGRAMDATA%\DockerDesktop\version-bin\ as a low-privilege user, and then waiting for an admin or service user to authenticate with Docker, restart Docker, or run 'docker login' to force the command. CVE-2019-15752
VCID-y6tt-h3zz-ukev docker: Ambient capability usage in containers CVE-2016-8867
VCID-yt33-nmzd-r3cs docker: command injection due to a missing validation of the git ref command CVE-2019-13139

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:29:06.677893+00:00 Debian Importer Fixing VCID-nkhu-t2nh-s7b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:11:12.013288+00:00 Debian Importer Fixing VCID-qwqe-27yu-8kds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:06:35.292274+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:01:06.529282+00:00 Debian Importer Fixing VCID-uckr-kzdf-7ydj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:49:39.049598+00:00 Debian Importer Fixing VCID-6vru-hsfs-rufg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:44:04.005975+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:40.209482+00:00 Debian Importer Fixing VCID-4mf3-mmz6-2kfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:22:31.657183+00:00 Debian Importer Fixing VCID-m45k-qc4s-dycq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:08.626758+00:00 Debian Importer Fixing VCID-gbw6-3a59-mbhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:54.694418+00:00 Debian Importer Fixing VCID-e9ng-x516-53cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:58:14.979656+00:00 Debian Importer Fixing VCID-eb24-pguf-ryg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:38.198205+00:00 Debian Importer Fixing VCID-cey6-s9jk-s7cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:51.449334+00:00 Debian Importer Fixing VCID-sh5d-p485-6qh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:25.751571+00:00 Debian Importer Fixing VCID-bhju-575k-ebh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:35.369660+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:06.808017+00:00 Debian Importer Fixing VCID-h83p-v26k-s7fa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:25.679482+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:22.670526+00:00 Debian Importer Fixing VCID-165g-hgmx-nybk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:41.371401+00:00 Debian Importer Fixing VCID-pevy-d197-zydv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:30.951324+00:00 Debian Importer Fixing VCID-7z14-w8da-rufv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:16.822649+00:00 Debian Importer Fixing VCID-u44m-mgza-nfcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:28.799966+00:00 Debian Importer Fixing VCID-f6d3-yyvz-xqgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:42.295380+00:00 Debian Importer Fixing VCID-43es-2d6x-jba8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:37.420251+00:00 Debian Importer Fixing VCID-qxhd-hnja-2qad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:29.525713+00:00 Debian Importer Fixing VCID-yt33-nmzd-r3cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:15.355042+00:00 Debian Importer Fixing VCID-k8uy-g29x-hkht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:23.996340+00:00 Debian Importer Fixing VCID-e6sp-khpk-r3d8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:03.672115+00:00 Debian Importer Fixing VCID-ksbt-33eq-93c9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:35.700111+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:25.222350+00:00 Debian Importer Fixing VCID-41ft-14gt-bbbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:20.090204+00:00 Debian Importer Fixing VCID-su25-rgw1-xkg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:12.872577+00:00 Debian Importer Fixing VCID-6gxe-db4h-93ex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:34.180524+00:00 Debian Importer Fixing VCID-3eju-5upk-auhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:09.745163+00:00 Debian Importer Fixing VCID-gsez-t7u3-dubr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:01.235069+00:00 Debian Importer Fixing VCID-smxj-2zhy-yycc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:37.809507+00:00 Debian Importer Fixing VCID-8uuk-1592-syg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:32.856231+00:00 Debian Importer Fixing VCID-f31s-pxtj-6uej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:33.061508+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:51.685832+00:00 Debian Importer Fixing VCID-ahbf-gwnw-nufp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:59.922097+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:41.666287+00:00 Debian Importer Fixing VCID-pnva-j5xs-7udv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:39.128459+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:13.480360+00:00 Debian Importer Fixing VCID-gund-83cy-9fap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:58.883735+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:05.708675+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:44.904029+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:20.684601+00:00 Debian Importer Fixing VCID-nkhu-t2nh-s7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:25.779128+00:00 Debian Importer Fixing VCID-qwqe-27yu-8kds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:00:52.528207+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:56:46.134607+00:00 Debian Importer Fixing VCID-uckr-kzdf-7ydj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:06.865114+00:00 Debian Importer Fixing VCID-6vru-hsfs-rufg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:54.022668+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:37.043528+00:00 Debian Importer Fixing VCID-4mf3-mmz6-2kfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:00.448863+00:00 Debian Importer Fixing VCID-m45k-qc4s-dycq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:26.759055+00:00 Debian Importer Fixing VCID-gbw6-3a59-mbhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:53.808387+00:00 Debian Importer Fixing VCID-e9ng-x516-53cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:24.178573+00:00 Debian Importer Fixing VCID-eb24-pguf-ryg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:16.174037+00:00 Debian Importer Fixing VCID-cey6-s9jk-s7cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:55.080221+00:00 Debian Importer Fixing VCID-sh5d-p485-6qh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:54.167993+00:00 Debian Importer Fixing VCID-bhju-575k-ebh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:32.214154+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:58.205222+00:00 Debian Importer Fixing VCID-h83p-v26k-s7fa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:59.542974+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:16.046029+00:00 Debian Importer Fixing VCID-165g-hgmx-nybk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:56.547838+00:00 Debian Importer Fixing VCID-pevy-d197-zydv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:48.601923+00:00 Debian Importer Fixing VCID-7z14-w8da-rufv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:41.945806+00:00 Debian Importer Fixing VCID-u44m-mgza-nfcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:34.296621+00:00 Debian Importer Fixing VCID-f6d3-yyvz-xqgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:52.669945+00:00 Debian Importer Fixing VCID-43es-2d6x-jba8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:49.075642+00:00 Debian Importer Fixing VCID-qxhd-hnja-2qad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:38.316518+00:00 Debian Importer Fixing VCID-yt33-nmzd-r3cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:26.059758+00:00 Debian Importer Fixing VCID-k8uy-g29x-hkht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:43.008137+00:00 Debian Importer Fixing VCID-e6sp-khpk-r3d8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:32.216962+00:00 Debian Importer Fixing VCID-ksbt-33eq-93c9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:53.875173+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:11.937529+00:00 Debian Importer Fixing VCID-41ft-14gt-bbbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:52.985176+00:00 Debian Importer Fixing VCID-su25-rgw1-xkg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:02.401303+00:00 Debian Importer Fixing VCID-6gxe-db4h-93ex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:51.153234+00:00 Debian Importer Fixing VCID-3eju-5upk-auhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:51.416363+00:00 Debian Importer Fixing VCID-gsez-t7u3-dubr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:30.154003+00:00 Debian Importer Fixing VCID-smxj-2zhy-yycc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:16.389320+00:00 Debian Importer Fixing VCID-8uuk-1592-syg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:13.496854+00:00 Debian Importer Fixing VCID-f31s-pxtj-6uej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:02.464588+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:34.755983+00:00 Debian Importer Fixing VCID-ahbf-gwnw-nufp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:41.609489+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:31.315045+00:00 Debian Importer Fixing VCID-pnva-j5xs-7udv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:11.436384+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:55.136695+00:00 Debian Importer Fixing VCID-gund-83cy-9fap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:44.101605+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:35.658704+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:22.812591+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:21:32.818337+00:00 Debian Importer Affected by VCID-8e1u-z6kg-ryhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.795515+00:00 Debian Importer Affected by VCID-6tg9-3vhh-muae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.753455+00:00 Debian Importer Affected by VCID-b2qe-8u58-2qck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.728137+00:00 Debian Importer Affected by VCID-1sky-21r5-3qcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.701744+00:00 Debian Importer Affected by VCID-njcw-wc13-dqcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.677997+00:00 Debian Importer Affected by VCID-e82r-vc77-f7bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.655048+00:00 Debian Importer Affected by VCID-quyf-eq2s-dbda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.631384+00:00 Debian Importer Affected by VCID-bzeb-kj67-vfds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:21:32.605864+00:00 Debian Importer Affected by VCID-avqu-wswg-c3ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:42.318641+00:00 Debian Importer Fixing VCID-nkhu-t2nh-s7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:41.714486+00:00 Debian Importer Fixing VCID-qwqe-27yu-8kds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:19.793461+00:00 Debian Importer Fixing VCID-vkba-amt4-m7e6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:59.878831+00:00 Debian Importer Fixing VCID-uckr-kzdf-7ydj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:15.529551+00:00 Debian Importer Fixing VCID-6vru-hsfs-rufg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:01.298489+00:00 Debian Importer Fixing VCID-evqv-4z17-kkcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:00.792480+00:00 Debian Importer Fixing VCID-4mf3-mmz6-2kfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:39.654527+00:00 Debian Importer Fixing VCID-m45k-qc4s-dycq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:18.792696+00:00 Debian Importer Fixing VCID-gbw6-3a59-mbhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:35.089755+00:00 Debian Importer Fixing VCID-e9ng-x516-53cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:19.622987+00:00 Debian Importer Fixing VCID-eb24-pguf-ryg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:46.512444+00:00 Debian Importer Fixing VCID-cey6-s9jk-s7cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:05.413744+00:00 Debian Importer Fixing VCID-sh5d-p485-6qh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:47.776765+00:00 Debian Importer Fixing VCID-bhju-575k-ebh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:43.272791+00:00 Debian Importer Fixing VCID-y6tt-h3zz-ukev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:30.971730+00:00 Debian Importer Fixing VCID-h83p-v26k-s7fa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:09.055586+00:00 Debian Importer Fixing VCID-2ttv-me4k-z7hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:51.198398+00:00 Debian Importer Fixing VCID-165g-hgmx-nybk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:46.896133+00:00 Debian Importer Fixing VCID-pevy-d197-zydv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:33.714193+00:00 Debian Importer Fixing VCID-7z14-w8da-rufv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:04.772041+00:00 Debian Importer Fixing VCID-u44m-mgza-nfcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:41.292001+00:00 Debian Importer Fixing VCID-f6d3-yyvz-xqgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:06.971560+00:00 Debian Importer Fixing VCID-43es-2d6x-jba8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:06.884234+00:00 Debian Importer Fixing VCID-qxhd-hnja-2qad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:53.119134+00:00 Debian Importer Fixing VCID-yt33-nmzd-r3cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:52.298880+00:00 Debian Importer Fixing VCID-k8uy-g29x-hkht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:35.089628+00:00 Debian Importer Fixing VCID-e6sp-khpk-r3d8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:33.956579+00:00 Debian Importer Fixing VCID-ksbt-33eq-93c9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:20.126786+00:00 Debian Importer Fixing VCID-jgyp-7k51-1uda https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:13.045329+00:00 Debian Importer Fixing VCID-41ft-14gt-bbbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:55.744026+00:00 Debian Importer Fixing VCID-su25-rgw1-xkg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:45.376739+00:00 Debian Importer Fixing VCID-6gxe-db4h-93ex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:19.250269+00:00 Debian Importer Fixing VCID-3eju-5upk-auhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:34.815415+00:00 Debian Importer Fixing VCID-gsez-t7u3-dubr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:27.001026+00:00 Debian Importer Fixing VCID-smxj-2zhy-yycc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:25.872439+00:00 Debian Importer Fixing VCID-8uuk-1592-syg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:25.054959+00:00 Debian Importer Fixing VCID-f31s-pxtj-6uej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:18.959935+00:00 Debian Importer Fixing VCID-au62-jayw-u7hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:18.554655+00:00 Debian Importer Fixing VCID-ahbf-gwnw-nufp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:01.719448+00:00 Debian Importer Fixing VCID-w4uc-6mvs-u3g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:53.804481+00:00 Debian Importer Fixing VCID-pnva-j5xs-7udv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:49.227630+00:00 Debian Importer Fixing VCID-9zkj-h3wh-afb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:47.536099+00:00 Debian Importer Fixing VCID-gund-83cy-9fap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:45.605957+00:00 Debian Importer Fixing VCID-2hy3-uwad-mydt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:17.160735+00:00 Debian Importer Fixing VCID-14uu-1w2t-ekh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:16.187011+00:00 Debian Importer Fixing VCID-5syq-v7xj-zqcv https://security-tracker.debian.org/tracker/data/json 38.1.0