Name | CVE-2023-2253 |
Description | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3473-1, DSA-5414-1 |
Debian Bugs | 1035956 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
docker-registry (PTS) | buster | 2.6.2~ds1-2 | vulnerable |
buster (security) | 2.6.2~ds1-2+deb10u1 | fixed | |
bullseye | 2.7.1+ds2-7 | vulnerable | |
bullseye (security) | 2.7.1+ds2-7+deb11u1 | fixed | |
sid, trixie, bookworm | 2.8.2+ds1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
docker-registry | source | buster | 2.6.2~ds1-2+deb10u1 | DLA-3473-1 | ||
docker-registry | source | bullseye | 2.7.1+ds2-7+deb11u1 | DSA-5414-1 | ||
docker-registry | source | (unstable) | 2.8.2+ds1-1 | 1035956 |
Fixed by: https://github.com/distribution/distribution/commit/521ea3d973cb0c7089ebbcdd4ccadc34be941f54 (v2.8.2-beta.1)
https://www.openwall.com/lists/oss-security/2023/05/09/1
https://github.com/distribution/distribution/security/advisories/GHSA-hqxw-f8mx-cpmw