Source: docker-compose
Version: 2.32.4-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for docker-compose.

CVE-2025-62725[0]:
| Docker Compose trusts the path information embedded in remote OCI
| compose artifacts. When a layer includes the annotations
| com.docker.compose.extends or com.docker.compose.envfile, Compose
| joins the attacker‑supplied value from
| com.docker.compose.file/com.docker.compose.envfile with its local
| cache directory and writes the file there. This affects any platform
| or workflow that resolves remote OCI compose artifacts, Docker
| Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud
| dev environments is affected. An attacker can escape the cache
| directory and overwrite arbitrary files on the machine running
| docker compose, even if the user only runs read‑only commands such
| as docker compose config or docker compose ps. This issue is fixed
| in v2.40.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-62725
    https://www.cve.org/CVERecord?id=CVE-2025-62725
[1] https://github.com/docker/compose/security/advisories/GHSA-gv8h-7v7w-r22q
[2] 
https://github.com/docker/compose/commit/69bcb962bfb2ea53b41aa925333d356b577d6176

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to