DescriptionDocker Registry before 2.6.2 in Docker Distribution does not properly restrict the amount of content accepted from a user, which allows remote attackers to cause a denial of service (memory consumption) via the manifest endpoint.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs869242

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
docker-registry (PTS)buster2.6.2~ds1-2fixed
buster (security)2.6.2~ds1-2+deb10u1fixed
bullseye (security), bullseye2.7.1+ds2-7+deb11u1fixed
sid, trixie, bookworm2.8.2+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Search for package or bug name: Reporting problems