Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-41190

Published: 17 November 2021

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are unable to update to version 1.0.1 of the spec.

Mitigation

seth-arnold> Only use trusted image servers.

Priority

Low

Cvss 3 Severity Score

5.0

Score breakdown

Status

Package Release Status
containerd
Launchpad, Ubuntu, Debian
bionic
Released (1.5.9-0ubuntu1~18.04.1)
focal
Released (1.5.9-0ubuntu1~20.04.4)
hirsute Ignored
(end of life)
impish
Released (1.5.9-0ubuntu1~21.10.3)
jammy
Released (1.5.9-0ubuntu1)
kinetic
Released (1.5.9-0ubuntu1)
lunar
Released (1.5.9-0ubuntu1)
mantic
Released (1.5.9-0ubuntu1)
noble
Released (1.5.9-0ubuntu1)
trusty Ignored
(end of standard support)
upstream
Released (1.5.8)
xenial Needs triage

Patches:
upstream: https://github.com/containerd/containerd/commit/26c76a3014e71af5ad2f396ec76e0e0ecc8e25a3

docker-registry
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(not included in package)
focal Not vulnerable
(not included in package)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy Not vulnerable
(not included in package)
kinetic Ignored
(end of life, was needs-triage)
lunar Not vulnerable
(not included in package)
mantic Not vulnerable
(not included in package)
noble Not vulnerable
(not included in package)
trusty Ignored
(end of standard support)
upstream Not vulnerable
(not included in package)
xenial Not vulnerable
(not included in package)
docker.io
Launchpad, Ubuntu, Debian
bionic Needed

focal Not vulnerable
(20.10.11)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy Not vulnerable
(20.10.11)
kinetic Not vulnerable
(20.10.11)
lunar Not vulnerable
(20.10.11)
mantic Not vulnerable
(20.10.11)
noble Not vulnerable
(20.10.11)
upstream
Released (20.10.11)
xenial Needed

Patches:

upstream: https://github.com/moby/moby/commit/10106a0f66d0ff7795b862eb196abbc1d438658d

Severity score breakdown

Parameter Value
Base score 5.0
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Changed
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N