Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3473-1 | docker-registry security update |
Debian DSA |
DSA-5414-1 | docker-registry security update |
EUVD |
EUVD-2023-1561 | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. |
Github GHSA |
GHSA-hqxw-f8mx-cpmw | distribution catalog API endpoint can lead to OOM via malicious user input |
Ubuntu USN |
USN-6336-1 | Docker Registry vulnerabilities |
Tue, 07 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-07T21:30:03.775Z
Reserved: 2023-04-24T00:00:00.000Z
Link: CVE-2023-2253
Updated: 2024-08-02T06:19:14.055Z
Status : Modified
Published: 2023-06-06T20:15:12.493
Modified: 2025-01-07T22:15:29.833
Link: CVE-2023-2253
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN