Логотип exploitDog
bind:"GHSA-v95c-p5hm-xq8f" OR bind:"CVE-2021-43784"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-v95c-p5hm-xq8f" OR bind:"CVE-2021-43784"

Количество 12

Количество 12

github логотип

GHSA-v95c-p5hm-xq8f

почти 4 года назад

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
EPSS: Низкий
ubuntu логотип

CVE-2021-43784

почти 4 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2021-43784

почти 4 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2021-43784

почти 4 года назад

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2021-43784

почти 4 года назад

CVSS3: 5
EPSS: Низкий
debian логотип

CVE-2021-43784

почти 4 года назад

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:4171-1

почти 4 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1625-1

почти 4 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4171-1

почти 4 года назад

Security update for runc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:4059-1

почти 4 года назад

Security update for runc

EPSS: Низкий
fstec логотип

BDU:2023-02652

почти 4 года назад

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-6380

почти 2 года назад

ELSA-2023-6380: runc security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-v95c-p5hm-xq8f

Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC

CVSS3: 6
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 6
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted con...

CVSS3: 5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted config

CVSS3: 6
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-43784

runc is a CLI tool for spawning and running containers on Linux accord ...

CVSS3: 6
0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:1625-1

Security update for runc

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:4171-1

Security update for runc

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:4059-1

Security update for runc

0%
Низкий
почти 4 года назад
fstec логотип
BDU:2023-02652

Уязвимость инструмента для запуска изолированных контейнеров Runc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 5
0%
Низкий
почти 4 года назад
oracle-oval логотип
ELSA-2023-6380

ELSA-2023-6380: runc security update (MODERATE)

почти 2 года назад

Уязвимостей на страницу