CVE-2021-21285

Source
https://cve.org/CVERecord?id=CVE-2021-21285
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21285.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-21285
Aliases
Downstream
Related
Published
2021-02-02T18:15:12.203Z
Modified
2026-05-16T11:53:01.301933848Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

Database specific
{
    "unresolved_ranges": [
        {
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "debian:debian_linux",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "10.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "docker:docker",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "19.03.15"
                },
                {
                    "fixed": "19.03.15"
                },
                {
                    "fixed": "19.03.15"
                },
                {
                    "introduced": "20.0.0"
                },
                {
                    "fixed": "20.10.3"
                },
                {
                    "introduced": "20.0.0"
                },
                {
                    "fixed": "20.10.3"
                },
                {
                    "introduced": "20.0.0"
                },
                {
                    "fixed": "20.10.3"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "netapp:e-series_santricity_os_controller",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "introduced": "11.0"
                },
                {
                    "last_affected": "11.60.3"
                }
            ]
        }
    ]
}
References

Affected packages