Bug 1924742 (CVE-2021-21285)

Summary: CVE-2021-21285 docker: daemon crash during image pull of malicious image
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amurdaca, bdettelb, dramseur, dwalsh, jhunter, kaycoth, kmitts, mgala, mjudeiki, sparks, tomckay
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: docker 19.03.15, docker 20.10.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Docker. Pulling an intentionally malformed Docker image manifest could lead to a crash of the `dockerd` daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-28 12:46:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1934046, 1934047    
Bug Blocks: 1924746    

Description Guilherme de Almeida Suckevicz 2021-02-03 14:37:01 UTC
In Docker before versions 19.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

Comment 1 Mauro Matteo Cascella 2021-02-19 14:56:00 UTC
External References:

https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8

Comment 3 Mauro Matteo Cascella 2021-03-03 14:58:36 UTC
Upstream fix:
https://github.com/moby/moby/commit/a7d4af84bd2f189b921c3ec60796aa825e3a0f2a