CVE-2020-13401

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-13401
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13401.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-13401
Aliases
Related
Published
2020-06-02T14:15:10Z
Modified
2025-02-14T11:09:12.024680Z
Severity
  • 6.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAPNETRAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.

References

Affected packages

Debian:11 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
19.03.11+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
19.03.11+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / docker.io

Package

Name
docker.io
Purl
pkg:deb/debian/docker.io?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
19.03.11+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/docker/engine

Affected ranges

Type
GIT
Repo
https://github.com/docker/engine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.3

Other

autorun/1

docs-v1.*

docs-v1.12.0-rc4-2016-07-15

upstream/0.*

upstream/0.1.1
upstream/0.1.2
upstream/0.1.3
upstream/0.1.4

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.10.0
v0.11.0
v0.11.1
v0.12.0
v0.2.0
v0.2.1
v0.2.2
v0.3.0
v0.3.1
v0.3.2
v0.3.3
v0.3.4
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.6.6
v0.6.7
v0.7.0
v0.7.0-rc5
v0.7.0-rc6
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.8.0
v0.8.1
v0.9.0

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1

v17.*

v17.12.0-ce-rc1

v18.*

v18.04.0-ce-rc1
v18.06.0-ce-rc1
v18.09.0-ce-tp0

v19.*

v19.03.0
v19.03.0-beta1
v19.03.0-beta2
v19.03.0-beta3
v19.03.0-beta4
v19.03.0-beta5
v19.03.0-rc2
v19.03.0-rc3
v19.03.1
v19.03.10
v19.03.2
v19.03.2-beta1
v19.03.2-rc1
v19.03.3
v19.03.3-beta1
v19.03.3-beta2
v19.03.3-rc1
v19.03.4
v19.03.4-rc1
v19.03.5
v19.03.5-beta1
v19.03.5-beta2
v19.03.5-rc1
v19.03.6
v19.03.6-rc1
v19.03.6-rc2
v19.03.7
v19.03.8
v19.03.9