DescriptionA flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3473-1, DSA-5414-1
Debian Bugs1035956

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
docker-registry (PTS)buster2.6.2~ds1-2vulnerable
buster (security)2.6.2~ds1-2+deb10u1fixed
bullseye (security), bullseye2.7.1+ds2-7+deb11u1fixed
sid, trixie, bookworm2.8.2+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


Fixed by: (v2.8.2-beta.1)

Search for package or bug name: Reporting problems