CVE-2023-2253
Published: 6 June 2023
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
Priority
Status
Package | Release | Status |
---|---|---|
docker-registry Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needs-triage)
|
jammy |
Released
(2.8.0+ds1-4ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
lunar |
Released
(2.8.1+ds1-2ubuntu1.1)
|
|
upstream |
Released
(2.8.2+ds1-1)
|
|
trusty |
Ignored
(end of standard support)
|
|
xenial |
Released
(2.3.0~ds1-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
bionic |
Released
(2.6.2~ds1-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
focal |
Released
(2.7.1+ds2-7ubuntu0.3)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2253
- https://github.com/distribution/distribution/commit/521ea3d973cb0c7089ebbcdd4ccadc34be941f54
- https://www.openwall.com/lists/oss-security/2023/05/09/1
- https://github.com/distribution/distribution/security/advisories/GHSA-hqxw-f8mx-cpmw
- https://ubuntu.com/security/notices/USN-6336-1
- NVD
- Launchpad
- Debian