CVE-2023-2253

NameCVE-2023-2253
DescriptionA flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3473-1, DSA-5414-1
Debian Bugs1035956

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
docker-registry (PTS)buster2.6.2~ds1-2vulnerable
buster (security)2.6.2~ds1-2+deb10u1fixed
bullseye (security), bullseye2.7.1+ds2-7+deb11u1fixed
sid, trixie, bookworm2.8.2+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
docker-registrysourcebuster2.6.2~ds1-2+deb10u1DLA-3473-1
docker-registrysourcebullseye2.7.1+ds2-7+deb11u1DSA-5414-1
docker-registrysource(unstable)2.8.2+ds1-11035956

Notes

Fixed by: https://github.com/distribution/distribution/commit/521ea3d973cb0c7089ebbcdd4ccadc34be941f54 (v2.8.2-beta.1)
https://www.openwall.com/lists/oss-security/2023/05/09/1
https://github.com/distribution/distribution/security/advisories/GHSA-hqxw-f8mx-cpmw

Search for package or bug name: Reporting problems