Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-41190

Опубликовано: 17 нояб. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4
CVSS3: 3

Описание

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...

РелизСтатусПримечание
bionic

released

1.5.9-0ubuntu1~18.04.1
devel

released

1.5.9-0ubuntu1
esm-apps/bionic

released

1.5.9-0ubuntu1~18.04.1
esm-apps/noble

released

1.5.9-0ubuntu1
esm-apps/xenial

needs-triage

esm-infra/focal

not-affected

1.5.9-0ubuntu1~20.04.4
focal

released

1.5.9-0ubuntu1~20.04.4
hirsute

ignored

end of life
impish

released

1.5.9-0ubuntu1~21.10.3
jammy

released

1.5.9-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

not included in package
esm-apps/bionic

not-affected

not included in package
esm-apps/focal

not-affected

not included in package
esm-apps/jammy

not-affected

not included in package
esm-apps/noble

not-affected

not included in package
esm-apps/xenial

not-affected

not included in package
focal

not-affected

not included in package
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

20.10.11
esm-apps/bionic

needed

esm-apps/focal

not-affected

20.10.11
esm-apps/jammy

not-affected

20.10.11
esm-apps/noble

not-affected

20.10.11
esm-infra/xenial

needed

focal

not-affected

20.10.11
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

EPSS

Процентиль: 51%
0.00279
Низкий

4 Medium

CVSS2

3 Low

CVSS3

Связанные уязвимости

CVSS3: 5
redhat
больше 3 лет назад

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...

CVSS3: 3
nvd
больше 3 лет назад

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are una

suse-cvrf
больше 3 лет назад

Security update for singularity

CVSS3: 3
github
больше 3 лет назад

Clarify Content-Type handling

CVSS3: 3
fstec
больше 3 лет назад

Уязвимость приложения для упрощения и стандартизации распространения содержимого контейнеров Open Container Initiative Distribution Specification (OCI Distribution Specification), связанная с ошибкой смешения типов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 51%
0.00279
Низкий

4 Medium

CVSS2

3 Low

CVSS3

Уязвимость CVE-2021-41190