OESA-2021-1102

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1102
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1102.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1102
Upstream
Published
2021-04-07T11:02:44Z
Modified
2025-08-12T05:07:10.408621Z
Summary
docker security update
Details

Docker is an open source project to build, ship and run any application as a lightweight container. Docker containers are both hardware-agnostic and platform-agnostic. This means they can run anywhere, from your laptop to the largest EC2 compute instance and everything in between - and they don't require you to use a particular language, framework or packaging system. That makes them great building blocks for deploying and scaling web apps, databases, and backend services without depending on a particular stack or provider.

Security Fix(es):

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using --userns-remap, if the root user in the remapped namespace has access to the host filesystem they can modify files under /var/lib/docker/<remapping> that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.(CVE-2021-21284)

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.(CVE-2021-21285)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS / docker

Package

Name
docker
Purl
pkg:rpm/openEuler/docker&distro=openEuler-20.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
engine-18.09.0-202.oe1

Ecosystem specific

{
    "x86_64": [
        "docker-engine-18.09.0-202.oe1.x86_64.rpm",
        "docker-engine-18.09.0-202.oe1.x86_64.rpm"
    ],
    "src": [
        "docker-engine-18.09.0-202.oe1.src.rpm",
        "docker-engine-18.09.0-202.oe1.src.rpm"
    ],
    "aarch64": [
        "docker-engine-18.09.0-202.oe1.aarch64.rpm",
        "docker-engine-18.09.0-202.oe1.aarch64.rpm"
    ]
}

openEuler:20.03-LTS-SP1 / docker

Package

Name
docker
Purl
pkg:rpm/openEuler/docker&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
engine-18.09.0-202.oe1

Ecosystem specific

{
    "x86_64": [
        "docker-engine-18.09.0-202.oe1.x86_64.rpm"
    ],
    "src": [
        "docker-engine-18.09.0-202.oe1.src.rpm"
    ],
    "aarch64": [
        "docker-engine-18.09.0-202.oe1.aarch64.rpm"
    ]
}