Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-5906

Опубликовано: 02 нояб. 2020
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2020-5906: containerd security update (IMPORTANT)

[1.2.14-1.0.1]

  • BUILDINFO: commit=259ae80da592d4f6b5e3cdc87202d36bc86a3579
  • Addresses CVE-2020-15157

[1.2.14-1.0.0]

  • Added Oracle specific build files

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

containerd

1.2.14-1.0.1.el7

Oracle Linux x86_64

containerd

1.2.14-1.0.1.el7

Связанные CVE

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
redhat
больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
nvd
больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to

CVSS3: 6.1
debian
больше 5 лет назад

In containerd (an industry-standard container runtime) before version ...

CVSS3: 6.1
github
почти 4 года назад

containerd v1.2.x can be coerced into leaking credentials during image pull