USN-8230-1: Docker vulnerabilities

Publication date

6 May 2026

Overview

Several security issues were fixed in Docker.


Packages

Details

It was discovered that BuildKit, contained within Docker, incorrectly
handled file path validation when processing frontend API messages. An
attacker could possibly use this issue to write files outside of the
intended state directory. (CVE-2026-33747)

It was discovered that BuildKit, contained within Docker, incorrectly
validated the subdir component of Git URL fragments. An attacker could
possibly use this issue to access files outside of the checked-out
repository root. (CVE-2026-33748)

It was discovered that BuildKit, contained within Docker, incorrectly
handled file path validation when processing frontend API messages. An
attacker could possibly use this issue to write files outside of the
intended state directory. (CVE-2026-33747)

It was discovered that BuildKit, contained within Docker, incorrectly
validated the subdir component of Git URL fragments. An attacker could
possibly use this issue to access files outside of the checked-out
repository root. (CVE-2026-33748)

Update instructions

After a standard system update you need to restart Docker to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
26.04 LTS resolute docker.io –  29.1.3-0ubuntu4.1
24.04 LTS noble docker.io –  29.1.3-0ubuntu3~24.04.2
22.04 LTS jammy docker.io –  29.1.3-0ubuntu3~22.04.2
20.04 LTS focal docker.io –  26.1.3-0ubuntu1~20.04.1+esm2  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›