docker.io vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the docker.io package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-36621

<26.1.4+dfsg1-9
  • L
CVE-2024-36623

<26.1.4+dfsg1-9
  • L
CVE-2024-41110

<26.1.5+dfsg1-2
  • L
CVE-2024-32473

<26.1.4+dfsg1-9
  • L
CVE-2024-29018

<26.1.4+dfsg1-9
  • H
Origin Validation Error

<26.1.4+dfsg1-9
  • H
Unprotected Alternate Channel

<20.10.24+dfsg1-1
  • M
Missing Encryption of Sensitive Data

<20.10.24+dfsg1-1
  • M
Unprotected Alternate Channel

<20.10.24+dfsg1-1
  • M
CVE-2022-36109

<20.10.19+dfsg1-1
  • H
Information Exposure

<20.10.10+dfsg1-1
  • M
Improper Preservation of Permissions

<20.10.10+dfsg1-1
  • M
Improper Preservation of Permissions

<20.10.10+dfsg1-1
  • M
Resource Exhaustion

<20.10.3+dfsg1-1
  • M
Directory Traversal

<20.10.3+dfsg1-1
  • M
Incorrect Resource Transfer Between Spheres

<20.10.0~rc1+dfsg2-1
  • M
Insufficiently Protected Credentials

<19.03.13+dfsg2-1
  • M
Improper Input Validation

<19.03.11+dfsg1-1
  • M
CVE-2014-5278

<1.2.0~dfsg1-1
  • C
Arbitrary Code Injection

<18.09.1+dfsg1-9
  • H
OS Command Injection

<18.09.1+dfsg1-8
  • H
Information Exposure Through Log Files

<18.09.1+dfsg1-8
  • H
Race Condition

<18.09.1+dfsg1-7.1
  • L
Resource Exhaustion

<18.09.1+dfsg1-2
  • H
Improper Certificate Validation

<18.03.1+dfsg1-2
  • M
Execution with Unnecessary Privileges

<18.06.1+dfsg1-1
  • H
Improper Input Validation

<1.8.3~ds1-1
  • M
Improper Input Validation

<1.8.3~ds1-1
  • H
Directory Traversal

<1.3.3~dfsg1-1
  • C
Improper Input Validation

<1.6.0+dfsg1-1
  • H
Improper Input Validation

<1.3.0~dfsg1-1
  • M
Information Exposure

<1.13.1~ds3-1
  • M
Improper Input Validation

<18.03.1+dfsg1-2
  • H
CVE-2014-0047

<1.6.0+dfsg1-1
  • M
Race Condition

<1.13.1~ds1-2
  • H
Link Following

<1.6.1+dfsg1-1
  • H
Link Following

<1.6.1+dfsg1-1
  • M
Access Restriction Bypass

<1.6.1+dfsg1-1
  • H
Access Restriction Bypass

<1.6.1+dfsg1-1
  • M
Improper Input Validation

<1.3.3~dfsg1-1
  • C
Access Restriction Bypass

<1.3.3~dfsg1-1
  • H
Link Following

<1.3.2~dfsg1-1
  • M
Access Restriction Bypass

<1.3.2~dfsg1-1
  • M
Code

<1.3.1~dfsg1-1