DEBIAN-CVE-2026-33997

Source
https://security-tracker.debian.org/tracker/CVE-2026-33997
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33997.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-33997
Upstream
Published
2026-03-31T03:15:57.523Z
Modified
2026-04-05T13:00:16.665156Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the user. Plugins that request exactly one privilege are also affected, because no comparison is performed at all. This issue has been patched in version 29.3.1.

References

Affected packages

Debian:11 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*
20.10.5+dfsg1-1
20.10.5+dfsg1-1+deb11u1
20.10.5+dfsg1-1+deb11u2
20.10.5+dfsg1-1+deb11u3
20.10.5+dfsg1-1+deb11u4
20.10.8+dfsg1-1
20.10.8+dfsg1-2
20.10.10+dfsg1-1
20.10.11+dfsg1-1
20.10.11+dfsg1-2
20.10.14+dfsg1-1
20.10.17+dfsg1-1
20.10.19+dfsg1-1
20.10.21+dfsg1-1
20.10.22+dfsg1-1
20.10.22+dfsg1-2
20.10.23+dfsg1-1
20.10.24+dfsg1-1
20.10.25+dfsg1-1
20.10.25+dfsg1-2
20.10.25+dfsg1-3
20.10.25+dfsg1-4
26.*
26.1.4+dfsg1-1
26.1.4+dfsg1-2
26.1.4+dfsg1-3
26.1.4+dfsg1-4
26.1.4+dfsg1-5
26.1.4+dfsg1-6
26.1.4+dfsg1-7
26.1.4+dfsg1-8
26.1.4+dfsg1-9
26.1.4+dfsg2-1
26.1.4+dfsg3-1
26.1.5+dfsg1-1
26.1.5+dfsg1-2
26.1.5+dfsg1-3
26.1.5+dfsg1-4
26.1.5+dfsg1-5
26.1.5+dfsg1-6
26.1.5+dfsg1-7
26.1.5+dfsg1-8
26.1.5+dfsg1-9
26.1.5+dfsg1-10
27.*
27.5.1+dfsg1-1
27.5.1+dfsg1-2
27.5.1+dfsg2-1
27.5.1+dfsg3-1
27.5.1+dfsg3-2
27.5.1+dfsg3-3
27.5.1+dfsg3-4
27.5.1+dfsg3-5
27.5.1+dfsg3-6
27.5.1+dfsg4-1
27.5.1+dfsg4-2
28.*
28.5.2+dfsg1-1
28.5.2+dfsg2-1
28.5.2+dfsg3-1
28.5.2+dfsg3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33997.json"

Debian:12 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*
20.10.24+dfsg1-1
20.10.24+dfsg1-1+deb12u1
20.10.25+dfsg1-1
20.10.25+dfsg1-2
20.10.25+dfsg1-3
20.10.25+dfsg1-4
26.*
26.1.4+dfsg1-1
26.1.4+dfsg1-2
26.1.4+dfsg1-3
26.1.4+dfsg1-4
26.1.4+dfsg1-5
26.1.4+dfsg1-6
26.1.4+dfsg1-7
26.1.4+dfsg1-8
26.1.4+dfsg1-9
26.1.4+dfsg2-1
26.1.4+dfsg3-1
26.1.5+dfsg1-1
26.1.5+dfsg1-2
26.1.5+dfsg1-3
26.1.5+dfsg1-4
26.1.5+dfsg1-5
26.1.5+dfsg1-6
26.1.5+dfsg1-7
26.1.5+dfsg1-8
26.1.5+dfsg1-9
26.1.5+dfsg1-10
27.*
27.5.1+dfsg1-1
27.5.1+dfsg1-2
27.5.1+dfsg2-1
27.5.1+dfsg3-1
27.5.1+dfsg3-2
27.5.1+dfsg3-3
27.5.1+dfsg3-4
27.5.1+dfsg3-5
27.5.1+dfsg3-6
27.5.1+dfsg4-1
27.5.1+dfsg4-2
28.*
28.5.2+dfsg1-1
28.5.2+dfsg2-1
28.5.2+dfsg3-1
28.5.2+dfsg3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33997.json"

Debian:13 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*
26.1.5+dfsg1-9
26.1.5+dfsg1-10
27.*
27.5.1+dfsg1-1
27.5.1+dfsg1-2
27.5.1+dfsg2-1
27.5.1+dfsg3-1
27.5.1+dfsg3-2
27.5.1+dfsg3-3
27.5.1+dfsg3-4
27.5.1+dfsg3-5
27.5.1+dfsg3-6
27.5.1+dfsg4-1
27.5.1+dfsg4-2
28.*
28.5.2+dfsg1-1
28.5.2+dfsg2-1
28.5.2+dfsg3-1
28.5.2+dfsg3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33997.json"

Debian:14 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

26.*
26.1.5+dfsg1-9
26.1.5+dfsg1-10
27.*
27.5.1+dfsg1-1
27.5.1+dfsg1-2
27.5.1+dfsg2-1
27.5.1+dfsg3-1
27.5.1+dfsg3-2
27.5.1+dfsg3-3
27.5.1+dfsg3-4
27.5.1+dfsg3-5
27.5.1+dfsg3-6
27.5.1+dfsg4-1
27.5.1+dfsg4-2
28.*
28.5.2+dfsg1-1
28.5.2+dfsg2-1
28.5.2+dfsg3-1
28.5.2+dfsg3-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33997.json"