CVE-2025-54388: Moby firewalld reload makes published container ports accessible from remote hosts
N/A
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/docker/docker | go | >= 28.2.0, < 28.3.3 | 28.3.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is caused by an incomplete restoration of iptables rules after a firewalld
reload. The analysis of the provided patch pinpoints the exact location of the flaw. The commit bea959c7b793b32a893820b97c4eadc7c87fabb0
modifies the reapplyPerPortIptables
function in libnetwork/drivers/bridge/port_mapping_linux.go
. The change explicitly adds the missing logic to re-add endpoint-specific firewall rules, which were previously not being restored. The original function only restored port mapping rules, leaving a security gap. Therefore, the reapplyPerPortIptables
function is identified as the vulnerable function because it is the one that fails to perform the necessary security-critical operation, leading to the exposure of container ports.
Vulnerable functions
bridgeNetwork.reapplyPerPortIptables
libnetwork/drivers/bridge/port_mapping_linux.go