DEBIAN-CVE-2025-54410

Source
https://security-tracker.debian.org/tracker/CVE-2025-54410
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-54410.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-54410
Upstream
Published
2025-07-30T14:15:28Z
Modified
2025-09-25T08:00:20.922214Z
Summary
[none]
Details

Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. A firewalld vulnerability affects Moby releases before 28.0.0. When firewalld reloads, Docker fails to re-create iptables rules that isolate bridge networks, allowing any container to access all ports on any other container across different bridge networks on the same host. This breaks network segmentation between containers that should be isolated, creating significant risk in multi-tenant environments. Only containers in --internal networks remain protected. Workarounds include reloading firewalld and either restarting the docker daemon, re-creating bridge networks, or using rootless mode. Maintainers anticipate a fix for this issue in version 25.0.13.

References

Affected packages

Debian:11 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*

20.10.5+dfsg1-1
20.10.5+dfsg1-1+deb11u1
20.10.5+dfsg1-1+deb11u2
20.10.5+dfsg1-1+deb11u3
20.10.5+dfsg1-1+deb11u4
20.10.8+dfsg1-1
20.10.8+dfsg1-2
20.10.10+dfsg1-1
20.10.11+dfsg1-1
20.10.11+dfsg1-2
20.10.14+dfsg1-1
20.10.17+dfsg1-1
20.10.19+dfsg1-1
20.10.21+dfsg1-1
20.10.22+dfsg1-1
20.10.22+dfsg1-2
20.10.23+dfsg1-1
20.10.24+dfsg1-1
20.10.25+dfsg1-1
20.10.25+dfsg1-2
20.10.25+dfsg1-3
20.10.25+dfsg1-4

26.*

26.1.4+dfsg1-1
26.1.4+dfsg1-2
26.1.4+dfsg1-3
26.1.4+dfsg1-4
26.1.4+dfsg1-5
26.1.4+dfsg1-6
26.1.4+dfsg1-7
26.1.4+dfsg1-8
26.1.4+dfsg1-9
26.1.4+dfsg2-1
26.1.4+dfsg3-1
26.1.5+dfsg1-1
26.1.5+dfsg1-2
26.1.5+dfsg1-3
26.1.5+dfsg1-4
26.1.5+dfsg1-5
26.1.5+dfsg1-6
26.1.5+dfsg1-7
26.1.5+dfsg1-8
26.1.5+dfsg1-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*

20.10.24+dfsg1-1
20.10.24+dfsg1-1+deb12u1
20.10.25+dfsg1-1
20.10.25+dfsg1-2
20.10.25+dfsg1-3
20.10.25+dfsg1-4

26.*

26.1.4+dfsg1-1
26.1.4+dfsg1-2
26.1.4+dfsg1-3
26.1.4+dfsg1-4
26.1.4+dfsg1-5
26.1.4+dfsg1-6
26.1.4+dfsg1-7
26.1.4+dfsg1-8
26.1.4+dfsg1-9
26.1.4+dfsg2-1
26.1.4+dfsg3-1
26.1.5+dfsg1-1
26.1.5+dfsg1-2
26.1.5+dfsg1-3
26.1.5+dfsg1-4
26.1.5+dfsg1-5
26.1.5+dfsg1-6
26.1.5+dfsg1-7
26.1.5+dfsg1-8
26.1.5+dfsg1-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*

26.1.5+dfsg1-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*

26.1.5+dfsg1-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}