Логотип exploitDog
bind:"BDU:2023-02652" OR bind:"CVE-2021-43784"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-02652" OR bind:"CVE-2021-43784"

Количество 12

Количество 12

fstec логотип

BDU:2023-02652

больше 3 лет назад

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
EPSS: Низкий
ubuntu логотип

CVE-2021-43784

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2021-43784

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2021-43784

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2021-43784

больше 3 лет назад

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2021-43784

больше 3 лет назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:4171-1

больше 3 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1625-1

больше 3 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4171-1

больше 3 лет назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4059-1

больше 3 лет назад

Security update for runc

EPSS: Низкий
github логотип

GHSA-v95c-p5hm-xq8f

больше 3 лет назад

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6380

больше 1 года назад

ELSA-2023-6380: runc security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-02652

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1625-1

Security update for runc

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:4059-1

Security update for runc

0%
Низкий
больше 3 лет назад
github логотип
GHSA-v95c-p5hm-xq8f

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2023-6380

ELSA-2023-6380: runc security update (MODERATE)

больше 1 года назад

Уязвимостей на страницу