Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/docker@1.3.2-4?arch=el7
purl pkg:rpm/redhat/docker@1.3.2-4?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-gsez-t7u3-dubr
Aliases:
CVE-2014-9358
GHSA-qmmc-jppf-32wv
Directory Traversal in Docker Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." There are no reported fixed by versions.
VCID-smxj-2zhy-yycc
Aliases:
CVE-2014-6407
GHSA-5qgp-p5jc-w2rm
Arbitrary Code Execution in Docker Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:45:16.409742+00:00 RedHat Importer Affected by VCID-smxj-2zhy-yycc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6407.json 38.0.0
2026-04-01T14:45:06.528818+00:00 RedHat Importer Affected by VCID-gsez-t7u3-dubr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9358.json 38.0.0