CVE-2024-32473 Affecting docker package, versions <26.0.2-r0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-DOCKER-6670550
- published 22 Apr 2024
- disclosed 18 Apr 2024
Introduced: 18 Apr 2024
CVE-2024-32473 Open this link in a new tabHow to fix?
Upgrade Wolfi
docker
to version 26.0.2-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream docker
package and not the docker
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. In 26.0.0, IPv6 is not disabled on network interfaces, including those belonging to networks where --ipv6=false
. An container with an ipvlan
or macvlan
interface will normally be configured to share an external network link with the host machine. Because of this direct access, (1) Containers may be able to communicate with other hosts on the local network over link-local IPv6 addresses, (2) if router advertisements are being broadcast over the local network, containers may get SLAAC-assigned addresses, and (3) the interface will be a member of IPv6 multicast groups. This means interfaces in IPv4-only networks present an unexpectedly and unnecessarily increased attack surface. The issue is patched in 26.0.2. To completely disable IPv6 in a container, use --sysctl=net.ipv6.conf.all.disable_ipv6=1
in the docker create
or docker run
command. Or, in the service configuration of a compose
file.