GO-2021-0072

Source
https://pkg.go.dev/vuln/GO-2021-0072
Import Source
https://vuln.go.dev/ID/GO-2021-0072.json
Aliases
Published
2021-04-14T20:04:52Z
Modified
2024-04-26T21:22:33Z
Details

Various storage methods do not impose limits on how much content is accepted from user requests, allowing a malicious user to force the caller to allocate an arbitrary amount of memory.

References

Affected packages

Go / github.com/docker/distribution

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
2.7.0-rc.0+incompatible

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/docker/distribution/registry/handlers",
            "symbols": [
                "App.ServeHTTP",
                "NewApp",
                "blobUploadHandler.PatchBlobData",
                "blobUploadHandler.PutBlobUploadComplete",
                "catalogHandler.GetCatalog",
                "copyFullPayload",
                "imageManifestHandler.GetImageManifest",
                "imageManifestHandler.PutImageManifest"
            ]
        },
        {
            "path": "github.com/docker/distribution/registry/storage",
            "symbols": [
                "PurgeUploads",
                "Walk",
                "blobStore.Enumerate",
                "blobStore.Get",
                "linkedBlobStore.Enumerate",
                "linkedBlobStore.Get",
                "manifestStore.Enumerate",
                "manifestStore.Get",
                "registry.Enumerate",
                "registry.Repositories"
            ]
        }
    ]
}