Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/moby/moby
  4. ›
  5. GHSA-xmmx-7jpf-fx42

GHSA-xmmx-7jpf-fx42: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing

June 10, 2024 (updated July 5, 2024)

In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of Moby (Docker Engine) prior to 20.10.11 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.

References

  • github.com/advisories/GHSA-xmmx-7jpf-fx42
  • github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42

Code Behaviors & Features

Detect and mitigate GHSA-xmmx-7jpf-fx42 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 20.10.11

Fixed versions

  • 20.10.11

Solution

Upgrade to version 20.10.11 or above.

Source file

go/github.com/moby/moby/GHSA-xmmx-7jpf-fx42.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:47 +0000.