Количество 20
Количество 20
CVE-2021-41190
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...
CVE-2021-41190
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ...
CVE-2021-41190
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are una
openSUSE-SU-2021:1525-1
Security update for singularity
SUSE-SU-2025:02282-1
Security update for umoci
GHSA-mc8v-mgrf-8f4m
Clarify Content-Type handling
BDU:2023-03675
Уязвимость приложения для упрощения и стандартизации распространения содержимого контейнеров Open Container Initiative Distribution Specification (OCI Distribution Specification), связанная с ошибкой смешения типов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
openSUSE-SU-2022:0334-1
Security update for containerd, docker
SUSE-SU-2022:1507-1
Security update for containerd, docker
SUSE-SU-2022:0334-1
Security update for containerd, docker
SUSE-SU-2022:0213-1
Security update for containerd, docker
ROS-20230710-01
Множественные уязвимости podman
SUSE-SU-2023:0326-1
Security update for podman
SUSE-SU-2023:0187-1
Security update for podman
RLSA-2022:7457
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
ELSA-2022-7457
ELSA-2022-7457: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2022:23018-1
Security update for conmon, libcontainers-common, libseccomp, podman
SUSE-SU-2022:23018-1
Security update for conmon, libcontainers-common, libseccomp, podman
SUSE-SU-2025:03545-1
Security update for docker-stable
SUSE-SU-2025:03540-1
Security update for docker-stable
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-41190 The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ... | CVSS3: 3 | 0% Низкий | около 4 лет назад | |
CVE-2021-41190 The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are ... | CVSS3: 5 | 0% Низкий | около 4 лет назад | |
CVE-2021-41190 The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are una | CVSS3: 3 | 0% Низкий | около 4 лет назад | |
openSUSE-SU-2021:1525-1 Security update for singularity | 0% Низкий | около 4 лет назад | ||
SUSE-SU-2025:02282-1 Security update for umoci | 0% Низкий | 5 месяцев назад | ||
GHSA-mc8v-mgrf-8f4m Clarify Content-Type handling | CVSS3: 3 | 0% Низкий | около 4 лет назад | |
BDU:2023-03675 Уязвимость приложения для упрощения и стандартизации распространения содержимого контейнеров Open Container Initiative Distribution Specification (OCI Distribution Specification), связанная с ошибкой смешения типов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 3 | 0% Низкий | около 4 лет назад | |
openSUSE-SU-2022:0334-1 Security update for containerd, docker | почти 4 года назад | |||
SUSE-SU-2022:1507-1 Security update for containerd, docker | больше 3 лет назад | |||
SUSE-SU-2022:0334-1 Security update for containerd, docker | почти 4 года назад | |||
SUSE-SU-2022:0213-1 Security update for containerd, docker | почти 4 года назад | |||
ROS-20230710-01 Множественные уязвимости podman | CVSS3: 8.8 | больше 2 лет назад | ||
SUSE-SU-2023:0326-1 Security update for podman | почти 3 года назад | |||
SUSE-SU-2023:0187-1 Security update for podman | почти 3 года назад | |||
RLSA-2022:7457 Moderate: container-tools:rhel8 security, bug fix, and enhancement update | около 3 лет назад | |||
ELSA-2022-7457 ELSA-2022-7457: container-tools:ol8 security, bug fix, and enhancement update (MODERATE) | около 3 лет назад | |||
openSUSE-SU-2022:23018-1 Security update for conmon, libcontainers-common, libseccomp, podman | почти 4 года назад | |||
SUSE-SU-2022:23018-1 Security update for conmon, libcontainers-common, libseccomp, podman | почти 4 года назад | |||
SUSE-SU-2025:03545-1 Security update for docker-stable | 2 месяца назад | |||
SUSE-SU-2025:03540-1 Security update for docker-stable | 2 месяца назад |
Уязвимостей на страницу