A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3473-1 | docker-registry security update |
![]() |
DSA-5414-1 | docker-registry security update |
![]() |
EUVD-2023-1561 | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. |
![]() |
GHSA-hqxw-f8mx-cpmw | distribution catalog API endpoint can lead to OOM via malicious user input |
![]() |
USN-6336-1 | Docker Registry vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 07 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-07T21:30:03.775Z
Reserved: 2023-04-24T00:00:00
Link: CVE-2023-2253

Updated: 2024-08-02T06:19:14.055Z

Status : Modified
Published: 2023-06-06T20:15:12.493
Modified: 2025-01-07T22:15:29.833
Link: CVE-2023-2253


No data.