Versions Packages Information History CVEs Related Badges Report

Packages for docker

289 package(s) known

docker

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-bash-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-doc

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-fish-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-openrc

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-vim

18.06.1 Potentially vulnerable (18.06.1-r0)

docker-zsh-completion

18.06.1 Potentially vulnerable (18.06.1-r0)

docker

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-bash-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-doc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-fish-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-openrc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-vim

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-zsh-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-bash-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-cli

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-doc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-engine

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-fish-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-openrc

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-vim

18.09.8 Potentially vulnerable (18.09.8-r0)

docker-zsh-completion

18.09.8 Potentially vulnerable (18.09.8-r0)

docker

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-bash-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-cli

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-doc

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-engine

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-fish-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-openrc

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-vim

19.03.5 Potentially vulnerable (19.03.5-r1)

docker-zsh-completion

19.03.5 Potentially vulnerable (19.03.5-r1)

docker

20.10.3 (20.10.3-r0)

docker-bash-completion

20.10.3 (20.10.3-r0)

docker-cli

20.10.3 (20.10.3-r0)

docker-doc

20.10.3 (20.10.3-r0)

docker-engine

20.10.3 (20.10.3-r0)

docker-fish-completion

20.10.3 (20.10.3-r0)

docker-openrc

20.10.3 (20.10.3-r0)

docker-zsh-completion

20.10.3 (20.10.3-r0)

docker

20.10.3 (20.10.3-r1)

docker-bash-completion

20.10.3 (20.10.3-r1)

docker-cli

20.10.3 (20.10.3-r1)

docker-doc

20.10.3 (20.10.3-r1)

docker-engine

20.10.3 (20.10.3-r1)

docker-fish-completion

20.10.3 (20.10.3-r1)

docker-openrc

20.10.3 (20.10.3-r1)

docker-zsh-completion

20.10.3 (20.10.3-r1)

docker

20.10.11 (20.10.11-r1)

docker-bash-completion

20.10.11 (20.10.11-r1)

docker-cli

20.10.11 (20.10.11-r1)

docker-doc

20.10.11 (20.10.11-r1)

docker-engine

20.10.11 (20.10.11-r1)

docker-fish-completion

20.10.11 (20.10.11-r1)

docker-openrc

20.10.11 (20.10.11-r1)

docker-zsh-completion

20.10.11 (20.10.11-r1)

docker

20.10.16 (20.10.16-r0)

docker-bash-completion

20.10.16 (20.10.16-r0)

docker-cli

20.10.16 (20.10.16-r0)

docker-doc

20.10.16 (20.10.16-r0)

docker-engine

20.10.16 (20.10.16-r0)

docker-fish-completion

20.10.16 (20.10.16-r0)

docker-openrc

20.10.16 (20.10.16-r0)

docker-zsh-completion

20.10.16 (20.10.16-r0)

docker

20.10.18 (20.10.18-r0)

docker-bash-completion

20.10.18 (20.10.18-r0)

docker-cli

20.10.18 (20.10.18-r0)

docker-doc

20.10.18 (20.10.18-r0)

docker-engine

20.10.18 (20.10.18-r0)

docker-fish-completion

20.10.18 (20.10.18-r0)

docker-openrc

20.10.18 (20.10.18-r0)

docker-zsh-completion

20.10.18 (20.10.18-r0)

docker

20.10.18 (20.10.18-r0)

docker-bash-completion

20.10.18 (20.10.18-r0)

docker-cli

20.10.18 (20.10.18-r0)

docker-doc

20.10.18 (20.10.18-r0)

docker-engine

20.10.18 (20.10.18-r0)

docker-fish-completion

20.10.18 (20.10.18-r0)

docker-openrc

20.10.18 (20.10.18-r0)

docker-zsh-completion

20.10.18 (20.10.18-r0)

docker

20.10.13 (20.10.13-2.1.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

20.10.7 (20.10.7-5.76.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

20.10.7 (20.10.7-3.71.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

20.10.7 (20.10.7-2.69.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.13ce Potentially vulnerable (19.03.13ce-1.62.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-3.57.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-2.56.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

19.03.6ce Potentially vulnerable (19.03.6ce-4.58.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.09.9ce Potentially vulnerable (18.09.9ce-1.51.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.09.9ce Potentially vulnerable (18.09.9ce-2.52.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-6.24.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-5.22.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-10.32.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-4.19.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-2.16.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-8.28.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-7.25.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.06.1ce Potentially vulnerable (18.06.1ce-3.17.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.03.1ce Potentially vulnerable (18.03.1ce-5.0.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

18.03.1ce Potentially vulnerable (18.03.1ce-2.141.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):

docker

17.12.1ce Potentially vulnerable (17.12.1ce-1.135.amzn1)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0 and MIT and BSD and MPLv2.0 and WTFPL
  • Links(s):
Apertis v2020
v2020/development

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3+apertis1)
Apertis v2021
v2021/development

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3+apertis1)
Apertis v2022
v2022/development

docker.io

20.10.5 (20.10.5+dfsg1-1+deb11u1+apertis1)
Apertis v2023 Development
v2023dev1/development

docker.io

20.10.5 (20.10.5+dfsg1-1+deb11u1+apertis1)
Arch
community

docker

20.10.18 (1:20.10.18-1)

docker

20.10.7 (1:20.10.7-1.0)

docker

20.10.18 (1:20.10.18-1.0)

docker

20.10.18 (1:20.10.18-1)

docker

20.10.18 (1:20.10.18-1)

docker

20.10.17 (1:20.10.17-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker

20.10.17 (1:20.10.17-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker-git

r39078.b5ea9abf25 (1:r39078.b5ea9abf25-1)
Artix
galaxy

docker

20.10.17 (1:20.10.17-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~18.04.4)

docker

20.10.7
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-103.git7f2769b.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-108.git4ef4b30.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-109.gitcccb291.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-161.git64e9980.el7_8)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-162.git64e9980.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-203.git0be3e21.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-204.git0be3e21.el7)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-205.git7d71120.el7.centos)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-206.git7d71120.el7_9)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-208.git7d71120.el7_9)
CentOS 7
extras

docker

1.13.1 Potentially vulnerable (2:1.13.1-209.git7d71120.el7.centos)

[Deprecated] Docker CLI

99.0.0
CRUX 3.4
contrib

docker

18.09.6 Potentially vulnerable
CRUX 3.5
contrib

docker

19.03.14 Potentially vulnerable
CRUX 3.6
contrib

docker

20.10.18
CRUX 3.7
contrib

docker

20.10.18
Deepin
main

docker

1.5 Potentially vulnerable (1.5-2)
Devuan 3.0
beowulf/main

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)
Devuan 4.0
chimaera/main

docker.io

20.10.5 (20.10.5+dfsg1-1+deb11u2)
Devuan Unstable
unstable/main

docker.io

20.10.17 (20.10.17+dfsg1-1)

docker

20.10.18

sysutils/docker

18.09.5 Potentially vulnerable (18.09.5_2)
Fedora 26
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-44.git584d391.fc26)
Fedora 26
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-19.git27e468e.fc26)
Fedora 27
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-26.gitb5e3294.fc27)
Fedora 27
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-60.git9cb56fd.fc27)
Fedora 28
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-51.git4032bd5.fc28)
Fedora 28
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-65.git1185cfd.fc28)
Fedora 29
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-62.git9cb56fd.fc29)
Fedora 29
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-68.git47e2230.fc29)
Fedora 30
release

docker

1.13.1 Potentially vulnerable (2:1.13.1-66.git1185cfd.fc30)
Fedora 30
updates

docker

1.13.1 Potentially vulnerable (2:1.13.1-68.git47e2230.fc30)

sysutils/docker

18.09.5 Potentially vulnerable (18.09.5_5)

docker

17.05.0-ce Potentially vulnerable
Funtoo 1.4
core-kit

app-emulation/docker

20.10.17
Funtoo 1.4
core-kit

app-emulation/docker

19.03.13 Potentially vulnerable

app-containers/docker

20.10.17

docker

19.03.15

docker

20.10.18
KaOS
apps

docker

20.10.18 (20.10.18-1)

app-containers/docker

20.10.17

app-containers/docker

20.10.17

docker

20.10.17
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.1.mga7)
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.2.mga7)
Mageia 7
core/updates

docker

18.09.9 Potentially vulnerable (18.09.9-1.mga7)
Mageia 7
core/updates

docker

18.09.8 Potentially vulnerable (18.09.8-1.mga7)
Mageia 7
core/release

docker

18.09.3 Potentially vulnerable (18.09.3-2.mga7)
Mageia 8
core/updates

docker

20.10.14 (20.10.14-3.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

docker

20.10.9 (20.10.9-3.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

docker

20.10.5 (20.10.5-1.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/release

docker

19.03.15 (19.03.15-1.mga8)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • System/Configuration
  • License:
    • ASL 2.0
  • Links(s):
Mageia Cauldron
core/release

docker

20.10.16 (20.10.16-3.mga9)
Manjaro Stable
community

docker

20.10.17 (1:20.10.17-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):
Manjaro Testing
community

docker

20.10.18 (1:20.10.18-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker

20.10.18 (1:20.10.18-1)
  • Summary:
    Pack, ship and run any application as a lightweight container
  • License:
    • Apache
  • Links(s):

docker

20.10.7

docker

20.10.7

docker

20.10.14

docker

20.10.14

docker

20.10.17

docker

20.10.17

docker

20.10.18

docker

20.10.18
openmamba
devel

docker

20.10.18 (20.10.18-1mamba)
OpenMandriva 4.0
main/release

docker

18.09.6 Potentially vulnerable (1:18.09.6-2)
OpenMandriva 4.1
main/release

docker

19.03.5 Potentially vulnerable (1:19.03.5-1)
OpenMandriva 4.2
main/release

docker

20.10.2 Potentially vulnerable (1:20.10.2-2)

docker

20.10.18 (1:20.10.18-1)
OpenMandriva Cooker
main/release

docker

20.10.18 (1:20.10.18-1)

docker

20.10.18.20220909
  • Summary:
    Docker Command-Line Interface
  • Category:
    • Filesystem
  • License:
    • Apache
  • Links(s):
openSUSE Leap 42.3
updates/oss

docker

18.09.1_ce Potentially vulnerable (18.09.1_ce-54.1)
openSUSE Leap 42.3
updates/oss

docker

18.06.1_ce Potentially vulnerable (18.06.1_ce-48.2)
openSUSE Leap 42.3
updates/oss

docker

18.06.1_ce Potentially vulnerable (18.06.1_ce-51.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-36.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-39.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-42.1)
openSUSE Leap 42.3
updates/oss

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-45.1)
openSUSE Leap 42.3
updates/oss

docker

17.04.0_ce Potentially vulnerable (17.04.0_ce-33.11)

docker

1.12.6 Potentially vulnerable (1.12.6-31.15)
openSUSE Leap 15.0
updates/oss

docker

19.03.1_ce Potentially vulnerable (19.03.1_ce-lp150.5.27.1)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.17.2)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.20.1)
openSUSE Leap 15.0
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp150.5.23.1)

docker

17.09.1_ce Potentially vulnerable (17.09.1_ce-lp150.4.2)
openSUSE Leap 15.1
updates/oss

docker

19.03.11_ce Potentially vulnerable (19.03.11_ce-lp151.2.18.1)
openSUSE Leap 15.1
updates/oss

docker

19.03.5_ce Potentially vulnerable (19.03.5_ce-lp151.2.15.1)
openSUSE Leap 15.1
updates/oss

docker

19.03.1_ce Potentially vulnerable (19.03.1_ce-lp151.2.12.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.3.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.6.1)
openSUSE Leap 15.1
updates/oss

docker

18.09.6_ce Potentially vulnerable (18.09.6_ce-lp151.2.9.1)

docker

18.09.1_ce Potentially vulnerable (18.09.1_ce-lp151.1.2)
openSUSE Leap 15.2
updates/oss

docker

20.10.9_ce (20.10.9_ce-lp152.2.18.1)
openSUSE Leap 15.2
updates/oss

docker

20.10.6_ce (20.10.6_ce-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

docker

20.10.6_ce (20.10.6_ce-lp152.2.15.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.3.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.6.1)
openSUSE Leap 15.2
updates/oss

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-lp152.2.9.1)

docker

19.03.11_ce Potentially vulnerable (19.03.11_ce-lp152.1.1)

docker

19.03.15_ce Potentially vulnerable (19.03.15_ce-6.46.1)

docker

20.10.12_ce (20.10.12_ce-159.1)

docker

20.10.17_ce (20.10.17_ce-2.2)

docker

20.10.17 (20.10.17-1)
Parabola
community

docker

20.10.18 (1:20.10.18-1)
Pardus 19
updates/main

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)
Parrot
parrot-updates/main

docker.io

20.10.5 (20.10.5+dfsg1-1+deb11u2)
Parrot
parrot/main

docker.io

20.10.5 (20.10.5+dfsg1-1+deb11u2)

docker

20.10.18

docker

1.5 Potentially vulnerable (1.5-2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+deb10u3)

docker

1.5 Potentially vulnerable (1.5-2)

docker.io

18.09.1 Potentially vulnerable (18.09.1+dfsg1-7.1+rpi1+deb10u3)
Rosa 2014.1
main/updates

docker

1.11.2 Potentially vulnerable (1.11.2-2)
Rosa 2016.1
main/updates

docker

19.03.13 Potentially vulnerable (19.03.13-1)
Rosa 2016.1
main/testing

docker

19.03.7 Potentially vulnerable (19.03.7-1)
Rosa 2016.1
main/release

docker

1.11.2 Potentially vulnerable (1.11.2-4)
Rosa 2021.1
main/release

docker

20.10.17 (1:20.10.17-1)
Rosa Server 6.9
extra/updates

docker-io

1.7.1 Potentially vulnerable (1.7.1-4.res6)
Rosa Server 7.3
base/release

docker

1.8.2 Potentially vulnerable (1.8.2-10.res7c)
Rosa Server 7.5
base/release

docker

1.8.2 Potentially vulnerable (1.8.2-10.res7c)

docker

20.10.18
  • Summary:
    docker (manager for applications in Linux containers)

docker

0.11.1 Potentially vulnerable (0.11.1-19.el7)
  • Summary:
    Automates deployment of containerized applications
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Links(s):
Scoop
main

docker

20.10.18

docker

20.10.18

docker-dbginfo

20.10.18

docker

20.10.16
Trisquel 7.0
belenos-updates/main

docker.io

1.6.2 Potentially vulnerable (1.6.2~dfsg1-1ubuntu4~14.04.1)
Trisquel 7.0
belenos/main

docker.io

0.9.1 Potentially vulnerable (0.9.1~dfsg1-2)
Trisquel 8.0
flidas-updates/main

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~16.04.7)
Trisquel 8.0
flidas/main

docker.io

1.10.3 Potentially vulnerable (1.10.3-0ubuntu6)
Trisquel 9.0
etiona-updates/main

docker.io

20.10.7 (20.10.7-0ubuntu5~18.04.3)
Trisquel 9.0
etiona/main

docker.io

17.12.1 Potentially vulnerable (17.12.1-0ubuntu1)
Trisquel 10.0
nabia-updates/main

docker.io

20.10.12 (20.10.12-0ubuntu2~20.04.1)
Trisquel 10.0
nabia-updates/main

docker.io

20.10.7 (20.10.7-0ubuntu5~20.04.2)
Trisquel 10.0
nabia/main

docker.io

19.03.8 Potentially vulnerable (19.03.8-0ubuntu1)
Ubuntu 16.04
xenial-updates/universe

docker.io

18.09.7 Potentially vulnerable (18.09.7-0ubuntu1~16.04.7)

Docker

20.10.18