Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/docker@1.4.1-37?arch=el7
purl pkg:rpm/redhat/docker@1.4.1-37?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.5
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-8uuk-1592-syg2
Aliases:
CVE-2014-9356
GHSA-vj3f-3286-r4pf
Path Traversal in Docker Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. There are no reported fixed by versions.
VCID-cey6-s9jk-s7cf
Aliases:
CVE-2014-9357
GHSA-997c-fj8j-rq5h
Arbitrary Code Execution Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:45:06.507807+00:00 RedHat Importer Affected by VCID-cey6-s9jk-s7cf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9357.json 38.0.0
2026-04-01T14:45:06.486926+00:00 RedHat Importer Affected by VCID-8uuk-1592-syg2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9356.json 38.0.0