CVE-2023-2253

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-2253
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2253.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-2253
Aliases
Related
Published
2023-06-06T20:15:12Z
Modified
2024-09-18T03:22:52.777021Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the /v2/_catalog endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: n). This vulnerability allows a malicious user to submit an unreasonably large value for n, causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

References

Affected packages

Debian:11 / docker-registry

Package

Name
docker-registry
Purl
pkg:deb/debian/docker-registry?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.1+ds2-7+deb11u1

Affected versions

2.*

2.7.1+ds2-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / docker-registry

Package

Name
docker-registry
Purl
pkg:deb/debian/docker-registry?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.2+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / docker-registry

Package

Name
docker-registry
Purl
pkg:deb/debian/docker-registry?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.2+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}