Логотип exploitDog
bind:"CVE-2021-43784"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-43784"

Количество 12

Количество 12

ubuntu логотип

CVE-2021-43784

около 4 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2021-43784

около 4 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2021-43784

около 4 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2021-43784

около 4 лет назад

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2021-43784

около 4 лет назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:4171-1

около 4 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1625-1

около 4 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4171-1

около 4 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4059-1

около 4 лет назад

Security update for runc

EPSS: Низкий
github логотип

GHSA-v95c-p5hm-xq8f

около 4 лет назад

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
EPSS: Низкий
fstec логотип

BDU:2023-02652

около 4 лет назад

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6380

около 2 лет назад

ELSA-2023-6380: runc security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
0%
Низкий
около 4 лет назад
msrc логотип
CVE-2021-43784

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration

CVSS3: 5
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1625-1

Security update for runc

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:4059-1

Security update for runc

0%
Низкий
около 4 лет назад
github логотип
GHSA-v95c-p5hm-xq8f

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2023-02652

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
0%
Низкий
около 4 лет назад
oracle-oval логотип
ELSA-2023-6380

ELSA-2023-6380: runc security update (MODERATE)

около 2 лет назад

Уязвимостей на страницу