CVE-2026-2664 Overview
An out-of-bounds read vulnerability (CWE-125) has been identified in the grpcfuse kernel module present in the Linux VM in Docker Desktop for Windows, Linux, and macOS. This vulnerability affects Docker Desktop versions up to and including 4.61.0 and could allow a local attacker to cause unspecified impact by writing to /proc/docker entries.
Critical Impact
Local attackers with low privileges can exploit this out-of-bounds read vulnerability to potentially read sensitive memory contents from the grpcfuse kernel module, which could lead to information disclosure within containerized environments.
Affected Products
- Docker Desktop for Windows (up to version 4.61.0)
- Docker Desktop for Linux (up to version 4.61.0)
- Docker Desktop for macOS (up to version 4.61.0)
Discovery Timeline
- 2026-02-24 - CVE CVE-2026-2664 published to NVD
- 2026-02-24 - Last updated in NVD database
Technical Details for CVE-2026-2664
Vulnerability Analysis
This vulnerability is classified as an out-of-bounds read (CWE-125), a memory corruption issue that occurs when the software reads data past the end or before the beginning of the intended buffer. In the context of the grpcfuse kernel module within Docker Desktop's Linux VM, this flaw can be triggered through specially crafted writes to /proc/docker entries.
The grpcfuse module serves as a critical component for file system operations between the host and Docker's Linux VM, enabling FUSE (Filesystem in Userspace) functionality over gRPC. When this module improperly validates boundaries during memory read operations, it creates an exploitable condition.
The local attack vector requires an attacker to have low-level privileges on the system to interact with the /proc/docker entries. While the immediate impact is categorized as causing high confidentiality impact with no integrity or availability impact, the potential for information disclosure from kernel memory regions makes this a significant security concern for Docker Desktop users.
Root Cause
The root cause of this vulnerability lies in insufficient boundary checking within the grpcfuse kernel module when processing input written to /proc/docker entries. The module fails to properly validate the size and bounds of read operations, allowing memory access beyond allocated buffer boundaries. This type of vulnerability typically stems from missing or inadequate input validation and bounds checking in kernel-level code paths.
Attack Vector
The attack requires local access to a system running a vulnerable version of Docker Desktop. An attacker with low-level user privileges can craft malicious input to be written to /proc/docker entries, triggering the out-of-bounds read condition in the grpcfuse kernel module. The attack does not require user interaction and has low complexity, making exploitation straightforward for attackers with local system access.
The exploitation mechanism involves manipulating proc filesystem entries to trigger memory read operations that exceed intended buffer boundaries within the kernel module, potentially exposing sensitive kernel memory contents.
Detection Methods for CVE-2026-2664
Indicators of Compromise
- Unusual access patterns to /proc/docker entries from unexpected processes or users
- Abnormal memory read operations or kernel warnings associated with the grpcfuse module
- Unexpected processes attempting to interact with Docker's proc filesystem entries
Detection Strategies
- Monitor system calls and file operations targeting /proc/docker entries for anomalous behavior
- Implement kernel-level auditing to track interactions with the grpcfuse module
- Deploy endpoint detection solutions capable of monitoring for out-of-bounds memory access patterns
Monitoring Recommendations
- Enable comprehensive logging for Docker Desktop and related kernel module activities
- Configure alerts for unauthorized or unexpected access to proc filesystem entries related to Docker
- Implement file integrity monitoring on Docker Desktop installation directories
How to Mitigate CVE-2026-2664
Immediate Actions Required
- Upgrade Docker Desktop to version 4.62.0 or later immediately
- Restrict local user access to systems running vulnerable Docker Desktop versions
- Review system access logs for any suspicious activity targeting /proc/docker entries
Patch Information
Docker has addressed this vulnerability in Docker Desktop version 4.62.0. Users should update their Docker Desktop installation to this version or later to remediate the vulnerability. For detailed information about the fix, refer to the Docker Desktop Release Notes for version 4.62.0.
Workarounds
- Limit local user access to systems running Docker Desktop until the patch can be applied
- Implement additional access controls on /proc/docker entries where feasible
- Consider temporary isolation of Docker Desktop workloads on systems that cannot be immediately updated
# Update Docker Desktop via command line (example for Linux)
# Download and install Docker Desktop 4.62.0 or later from official Docker website
# Verify installed version after update
docker --version
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


