Skip to content

Commit f36a8f1

Browse files
1 parent 5e18c89 commit f36a8f1

2 files changed

Lines changed: 113 additions & 3 deletions

File tree

advisories/github-reviewed/2025/07/GHSA-4vq8-7jfc-9cvp/GHSA-4vq8-7jfc-9cvp.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4vq8-7jfc-9cvp",
4-
"modified": "2025-12-20T03:14:48Z",
4+
"modified": "2026-03-27T17:37:52Z",
55
"published": "2025-07-29T19:56:25Z",
66
"aliases": [
77
"CVE-2025-54410"
@@ -28,11 +28,14 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"last_affected": "25.0.12"
31+
"fixed": "25.0.13"
3232
}
3333
]
3434
}
35-
]
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 25.0.12"
38+
}
3639
},
3740
{
3841
"package": {
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pxq6-2prw-chj9",
4+
"modified": "2026-03-27T17:38:09Z",
5+
"published": "2026-03-27T17:38:09Z",
6+
"aliases": [
7+
"CVE-2026-33997"
8+
],
9+
"summary": "Moby has an Off-by-one error in its plugin privilege validation",
10+
"details": "## Summary\n\nA security vulnerability has been detected that allows [plugins](https://docs.docker.com/engine/extend/legacy_plugins/) privilege validation to be bypassed during `docker plugin install`. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the user.\n\nPlugins that request exactly one privilege are also affected, because no comparison is performed at all.\n\n## Impact\n\n**If plugins are not in use, there is no impact.**\n\nWhen a plugin is installed, the daemon computes the privileges required by the plugin's configuration and compares them with the privileges approved during installation. A malicious plugin can exploit this bug so that the daemon accepts privileges that differ from what was intended to be approved.\n\nAnyone who depends on the plugin installation approval flow as a meaningful security boundary is potentially impacted.\n\nDepending on the privilege set involved, this may include highly sensitive plugin permissions such as broad device access.\n\n**For consideration: exploitation still requires a plugin to be installed from a malicious source, and Docker plugins are relatively uncommon. Docker Desktop also does not support plugins.**\n\n## Workarounds\n\nIf unable to update immediately:\n- Do not install plugins from untrusted sources\n- Carefully review all privileges requested during `docker plugin install`\n- Restrict access to the Docker daemon to trusted parties, following the principle of least privilege\n- Avoid relying on plugin privilege approval as the only control boundary for sensitive environments\n\n## Credits\n\n- Reported by Cody (c@wormhole.guru, PGP 0x9FA5B73E)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/docker/docker"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
}
30+
]
31+
}
32+
],
33+
"database_specific": {
34+
"last_known_affected_version_range": "< 29.3.1"
35+
}
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/moby/moby/v2"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "2.0.0-beta.7.0.20260325113954-f4d6f25bf0c3"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/moby/moby"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
}
68+
]
69+
}
70+
],
71+
"database_specific": {
72+
"last_known_affected_version_range": "< 29.3.1"
73+
}
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "WEB",
79+
"url": "https://github.com/moby/moby/security/advisories/GHSA-pxq6-2prw-chj9"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/moby/moby/commit/f4d6f25bf0c3fa12d4968320a45685947756a22a"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://docs.docker.com/engine/extend/legacy_plugins"
88+
},
89+
{
90+
"type": "PACKAGE",
91+
"url": "https://github.com/moby/moby"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://github.com/moby/moby/releases/tag/docker-v29.3.1"
96+
}
97+
],
98+
"database_specific": {
99+
"cwe_ids": [
100+
"CWE-193"
101+
],
102+
"severity": "MODERATE",
103+
"github_reviewed": true,
104+
"github_reviewed_at": "2026-03-27T17:38:09Z",
105+
"nvd_published_at": null
106+
}
107+
}

0 commit comments

Comments
 (0)