First published: Tue Feb 02 2021(Updated: )
### Impact Pulling an intentionally malformed Docker image manifest crashes the `dockerd` daemon. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. ### Credits Maintainers would like to thank Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune for working on the vulnerability and Brad Geesaman for responsibly disclosing it to security@docker.com.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/docker.io | 18.09.1+dfsg1-7.1+deb10u3 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 20.10.25+dfsg1-2 | |
go/github.com/moby/moby | >=20.10.0-beta1<20.10.3 | 20.10.3 |
go/github.com/moby/moby | <19.3.15 | 19.3.15 |
Docker | <19.03.15 | |
Docker | >=20.0.0<20.10.3 | |
Debian Debian Linux | =10.0 | |
NetApp E-Series SANtricity OS Controller | >=11.0<=11.60.3 | |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21285 is a vulnerability in Docker that allows a remote attacker to cause a denial of service by crashing the dockerd daemon.
CVE-2021-21285 is caused by improper input validation in Docker. By tricking a victim into pulling a specially-crafted Docker image, the attacker can crash the dockerd daemon and cause a denial of service.
Docker versions up to and excluding 19.03.15 and versions between 20.0.0 and 20.10.3 are affected by CVE-2021-21285.
CVE-2021-21285 has a severity rating of 6.5, which is considered medium.
To fix CVE-2021-21285, update Docker to version 19.03.15 or higher if using a version prior to 20. And update to version 20.10.3 or higher if using a version between 20.0.0 and 20.10.3.