CVE-2024-36623
Published: December 10, 2024Last modified: June 5, 2025
Description
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.1 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | docker | Unknown (20.10.21-r1) |
| Stream | docker | Unknown (24.0.2-r0) |
References
- https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29
- https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115
- https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb
- https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8