An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "18.06.1-0ubuntu1~16.04.2",
"binary_name": "docker.io"
},
{
"binary_version": "18.06.1-0ubuntu1~16.04.2",
"binary_name": "golang-docker-dev"
},
{
"binary_version": "18.06.1-0ubuntu1~16.04.2",
"binary_name": "golang-github-docker-docker-dev"
},
{
"binary_version": "18.06.1-0ubuntu1~16.04.2",
"binary_name": "vim-syntax-docker"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "18.06.1-0ubuntu1~18.04.1",
"binary_name": "docker.io"
},
{
"binary_version": "18.06.1-0ubuntu1~18.04.1",
"binary_name": "golang-docker-dev"
},
{
"binary_version": "18.06.1-0ubuntu1~18.04.1",
"binary_name": "golang-github-docker-docker-dev"
},
{
"binary_version": "18.06.1-0ubuntu1~18.04.1",
"binary_name": "vim-syntax-docker"
}
]
}