Логотип exploitDog
bind:"CVE-2021-21334"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-21334"

Количество 11

Количество 11

ubuntu логотип

CVE-2021-21334

почти 5 лет назад

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability ...

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2021-21334

почти 5 лет назад

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability ...

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2021-21334

почти 5 лет назад

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has

CVSS3: 6.3
EPSS: Низкий
msrc логотип

CVE-2021-21334

больше 4 лет назад

environment variable leak

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2021-21334

почти 5 лет назад

In containerd (an industry-standard container runtime) before versions ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-6g2q-w5j3-fwh4

около 2 лет назад

containerd environment variable leak

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2023-00284

почти 5 лет назад

Уязвимость среды выполнения контейнеров Containerd, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1954-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0878-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1954-1

больше 4 лет назад

Security update for containerd, docker, runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1458-1

почти 5 лет назад

Security update for containerd, docker, runc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-21334

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability ...

CVSS3: 6.3
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-21334

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability ...

CVSS3: 6.3
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-21334

In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has

CVSS3: 6.3
0%
Низкий
почти 5 лет назад
msrc логотип
CVE-2021-21334

environment variable leak

CVSS3: 6.3
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-21334

In containerd (an industry-standard container runtime) before versions ...

CVSS3: 6.3
0%
Низкий
почти 5 лет назад
github логотип
GHSA-6g2q-w5j3-fwh4

containerd environment variable leak

CVSS3: 6.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-00284

Уязвимость среды выполнения контейнеров Containerd, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.3
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1954-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0878-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1954-1

Security update for containerd, docker, runc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1458-1

Security update for containerd, docker, runc

почти 5 лет назад

Уязвимостей на страницу