CVE-2024-36623
Published: December 10, 2024Last modified: June 5, 2025
Description
moby through v25.0.3 has a Race Condition vulnerability in the streamformatter package which can be used to trigger multiple concurrent write operations resulting in data corruption or application crashes.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | docker | Unknown (20.10.21-r1) |
Stream | docker | Unknown (24.0.2-r0) |
References
- https://gist.github.com/1047524396/c192c0159a19bf58a4373b696467dc29
- https://github.com/moby/moby/blob/v25.0.3/pkg/streamformatter/streamformatter.go#L115
- https://github.com/moby/moby/commit/5689dabfb357b673abdb4391eef426f297d7d1bb
- https://github.com/moby/moby/commit/8e3bcf19748838b30e34d612832d1dc9d90363b8