First published: Wed Mar 20 2024(Updated: )
Last updated 18 December 2024
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/docker/docker | <23.0.11 | 23.0.11 |
go/github.com/docker/docker | >=25.0.0<25.0.5 | 25.0.5 |
go/github.com/docker/docker | >=26.0.0-rc1<26.0.0-rc3 | 26.0.0-rc3 |
redhat/moby | <26.0.0 | 26.0.0 |
redhat/moby | <25.0.5 | 25.0.5 |
redhat/moby | <23.0.11 | 23.0.11 |
debian/docker.io | <=20.10.5+dfsg1-1+deb11u2<=20.10.5+dfsg1-1+deb11u4<=20.10.24+dfsg1-1+deb12u1 | 26.1.5+dfsg1-4 26.1.5+dfsg1-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29018 has been rated as a high severity vulnerability.
To fix CVE-2024-29018, update Moby to version 23.0.11, 25.0.5, or 26.0.0-rc3 depending on the affected package.
CVE-2024-29018 affects Moby versions prior to 23.0.11, any version from 25.0.0 to 25.0.5, and any version from 26.0.0-rc1 to 26.0.0-rc3.
Yes, Docker is affected if it uses vulnerable versions of Moby as a runtime component.
CVE-2024-29018 impacts multiple distributions and versions of Moby and Docker including components from Red Hat and Debian.