A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3473-1 | docker-registry security update |
Debian DSA |
DSA-5414-1 | docker-registry security update |
EUVD |
EUVD-2023-1561 | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. |
Github GHSA |
GHSA-hqxw-f8mx-cpmw | distribution catalog API endpoint can lead to OOM via malicious user input |
Ubuntu USN |
USN-6336-1 | Docker Registry vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 07 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-07T21:30:03.775Z
Reserved: 2023-04-24T00:00:00
Link: CVE-2023-2253
Updated: 2024-08-02T06:19:14.055Z
Status : Modified
Published: 2023-06-06T20:15:12.493
Modified: 2025-01-07T22:15:29.833
Link: CVE-2023-2253
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN