Back to bug 2184688
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-04-05 12:48:27 UTC | Depends On | 2184689, 2184690 | |
| Pedro Sampaio | 2023-04-05 12:49:31 UTC | Blocks | 2184692 | |
| Red Hat Bugzilla | 2023-07-07 08:35:51 UTC | Assignee | security-response-team | nobody |
| Anten Skrabec | 2023-07-11 17:10:58 UTC | Doc Text | A vulnerability was found in Moby which could allow a remote attacker to bypass security restrictions, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request, an attacker could exploit this vulnerability to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. | |
| Paige Jung | 2023-07-11 18:02:27 UTC | Doc Text | A vulnerability was found in Moby which could allow a remote attacker to bypass security restrictions, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request, an attacker could exploit this vulnerability to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. | A vulnerability was found in Moby due to an unprotected alternate channel within encrypted overlay networks, which could allow a remote attacker to bypass security restrictions. By sending a specially crafted request, an attacker could inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. |
Back to bug 2184688