First published: Tue Feb 02 2021(Updated: )
### Impact Pulling an intentionally malformed Docker image manifest crashes the `dockerd` daemon. ### Patches Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. ### Credits Maintainers would like to thank Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune for working on the vulnerability and Brad Geesaman for responsibly disclosing it to security@docker.com.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | <19.03.15 | |
Docker Docker | >=20.0.0<20.10.3 | |
Debian Debian Linux | =10.0 | |
NetApp E-Series SANtricity OS Controller | >=11.0<=11.60.3 | |
debian/docker.io | 18.09.1+dfsg1-7.1+deb10u3 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 20.10.25+dfsg1-2 | |
go/github.com/moby/moby | >=20.10.0-beta1<20.10.3 | 20.10.3 |
go/github.com/moby/moby | <19.3.15 | 19.3.15 |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21285 is a vulnerability in Docker that allows a remote attacker to cause a denial of service by crashing the dockerd daemon.
CVE-2021-21285 is caused by improper input validation in Docker. By tricking a victim into pulling a specially-crafted Docker image, the attacker can crash the dockerd daemon and cause a denial of service.
Docker versions up to and excluding 19.03.15 and versions between 20.0.0 and 20.10.3 are affected by CVE-2021-21285.
CVE-2021-21285 has a severity rating of 6.5, which is considered medium.
To fix CVE-2021-21285, update Docker to version 19.03.15 or higher if using a version prior to 20. And update to version 20.10.3 or higher if using a version between 20.0.0 and 20.10.3.