An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "18.06.1-0ubuntu1~16.04.2", "binary_name": "docker-doc" }, { "binary_version": "18.06.1-0ubuntu1~16.04.2", "binary_name": "docker.io" }, { "binary_version": "18.06.1-0ubuntu1~16.04.2", "binary_name": "golang-docker-dev" }, { "binary_version": "18.06.1-0ubuntu1~16.04.2", "binary_name": "golang-github-docker-docker-dev" }, { "binary_version": "18.06.1-0ubuntu1~16.04.2", "binary_name": "vim-syntax-docker" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "18.06.1-0ubuntu1~18.04.1", "binary_name": "docker-doc" }, { "binary_version": "18.06.1-0ubuntu1~18.04.1", "binary_name": "docker.io" }, { "binary_version": "18.06.1-0ubuntu1~18.04.1", "binary_name": "golang-docker-dev" }, { "binary_version": "18.06.1-0ubuntu1~18.04.1", "binary_name": "golang-github-docker-docker-dev" }, { "binary_version": "18.06.1-0ubuntu1~18.04.1", "binary_name": "vim-syntax-docker" } ] }