The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Docker CE

Go: denial of service via Malformed Certificate
An attacker can trigger a fatal error via Malformed Certificate of Go, in order to trigger a denial of service...
36837, CVE-2020-7919, VIGILANCE-VUL-31661
Docker docker-credential-secretservice: use after free
An attacker can force the usage of a freed memory area of Docker docker-credential-secretservice, in order to trigger a denial of service, and possibly to run code...
CVE-2019-17149-REJECT, CVE-2019-17150-REJECT, VIGILANCE-VUL-31233, ZDI-19-1029, ZDI-19-1030
Go: assertion error via dsa.Verify
An attacker can force an assertion error via dsa.Verify() of Go, in order to trigger a denial of service...
1283668, CVE-2019-17596, DSA-4551-1, ESA-2019-15, ESA-2019-16, openSUSE-SU-2019:2521-1, openSUSE-SU-2019:2522-1, RHSA-2020:0329-01, SUSE-SU-2019:2940-1, VIGILANCE-VUL-30722
libseccomp-golang: privilege escalation via Single Matching Argument
An attacker can bypass restrictions via Single Matching Argument of libseccomp-golang, in order to escalate his privileges...
CVE-2017-18367, VIGILANCE-VUL-30565
Go: filter bypass
An attacker can make a Go program accept ill formed HTTP requests, in order to by pass filters...
CVE-2019-16276, DSA-4534-1, openSUSE-SU-2019:2521-1, openSUSE-SU-2019:2522-1, RHSA-2020:0329-01, SUSE-SU-2019:2940-1, VIGILANCE-VUL-30469
Docker Engine/Moby: code execution via Docker Build Git URL
An attacker can use a vulnerability via Docker Build Git URL of Docker Engine/Moby, in order to run code...
CVE-2019-13139, DSA-4521-1, VIGILANCE-VUL-30139
Docker Engine: privilege escalation via Chroot Nsswitch
An attacker can bypass restrictions via Chroot Nsswitch of Docker Engine, in order to escalate his privileges...
CVE-2019-14271, DSA-4521-1, openSUSE-SU-2019:2021-1, SUSE-SU-2019:2117-1, SUSE-SU-2019:2119-1, VIGILANCE-VUL-29894
Docker Engine: information disclosure via Stack Deploy Debug Mode
An attacker can bypass access restrictions to data via Stack Deploy Debug Mode of Docker Engine, in order to obtain sensitive information...
CVE-2019-13509, DSA-4521-1, FEDORA-2019-4bed83e978, FEDORA-2019-5b54793a4a, openSUSE-SU-2019:2021-1, SUSE-SU-2019:2117-1, SUSE-SU-2019:2119-1, VIGILANCE-VUL-29822
Docker Engine/Moby: information disclosure via Symlink Exchange
An attacker can bypass access restrictions to data via Symlink Exchange of Docker Engine/Moby, in order to obtain sensitive information...
CVE-2018-15664, openSUSE-SU-2019:2044-1, RHSA-2019:1910-01, SUSE-SU-2019:2223-1, USN-4048-1, VIGILANCE-VUL-29653
Docker Engine/Moby: file corruption via chrootarchive
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Docker Engine/Moby on the host system...
CVE-2018-15664, openSUSE-SU-2019:1621-1, openSUSE-SU-2019:2044-1, RHSA-2019:1910-01, SUSE-SU-2019:1514-1, SUSE-SU-2019:1562-1, SUSE-SU-2019:2223-1, USN-4048-1, VIGILANCE-VUL-29403
Our database contains other pages. You can request a free trial to read them.

Display information about Docker CE: