{"id":"USN-4048-1","summary":"Docker vulnerabilities","details":"Aleksa Sarai discovered that Docker was vulnerable to a directory traversal\nattack. An attacker could use this vulnerability to read and write arbitrary\nfiles on the host filesystem as root.\n","modified":"2026-02-10T04:41:34Z","published":"2019-07-08T14:41:56Z","related":["UBUNTU-CVE-2018-15664","UBUNTU-CVE-2019-5736"],"upstream":["CVE-2018-15664","CVE-2019-5736","UBUNTU-CVE-2018-15664","UBUNTU-CVE-2019-5736"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4048-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-15664"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-5736"}],"affected":[{"package":{"name":"docker.io","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/docker.io@18.09.7-0ubuntu1~16.04.4?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"18.09.7-0ubuntu1~16.04.4"}]}],"versions":["1.6.2~dfsg1-1ubuntu4","1.10.2-0ubuntu3","1.10.2-0ubuntu4","1.10.3-0ubuntu1","1.10.3-0ubuntu4","1.10.3-0ubuntu5","1.10.3-0ubuntu6","1.11.2-0ubuntu5~16.04","1.12.1-0ubuntu13~16.04.1","1.12.3-0ubuntu4~16.04.2","1.12.6-0ubuntu1~16.04.1","1.13.1-0ubuntu1~16.04.2","17.03.2-0ubuntu2~16.04.1","18.06.1-0ubuntu1~16.04.2","18.06.1-0ubuntu1.2~16.04.1","18.09.2-0ubuntu1~16.04.1","18.09.5-0ubuntu1~16.04.2","18.09.7-0ubuntu1~16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"docker.io","binary_version":"18.09.7-0ubuntu1~16.04.4"},{"binary_name":"golang-docker-dev","binary_version":"18.09.7-0ubuntu1~16.04.4"},{"binary_name":"golang-github-docker-docker-dev","binary_version":"18.09.7-0ubuntu1~16.04.4"},{"binary_name":"vim-syntax-docker","binary_version":"18.09.7-0ubuntu1~16.04.4"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15664"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4048-1.json"}},{"package":{"name":"docker.io","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/docker.io@18.09.7-0ubuntu1~18.04.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"18.09.7-0ubuntu1~18.04.3"}]}],"versions":["1.13.1-0ubuntu6","17.03.2-0ubuntu1","17.03.2-0ubuntu3","17.03.2-0ubuntu5","17.12.1-0ubuntu1","18.06.1-0ubuntu1~18.04.1","18.06.1-0ubuntu1.2~18.04.1","18.09.2-0ubuntu1~18.04.1","18.09.5-0ubuntu1~18.04.2","18.09.7-0ubuntu1~18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"docker.io","binary_version":"18.09.7-0ubuntu1~18.04.3"},{"binary_name":"golang-docker-dev","binary_version":"18.09.7-0ubuntu1~18.04.3"},{"binary_name":"golang-github-docker-docker-dev","binary_version":"18.09.7-0ubuntu1~18.04.3"},{"binary_name":"vim-syntax-docker","binary_version":"18.09.7-0ubuntu1~18.04.3"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-15664"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4048-1.json"}}],"schema_version":"1.7.3"}