{ "schema_version": "1.4.0", "id": "GHSA-259w-8hf6-59c2", "modified": "2024-09-06T21:37:22Z", "published": "2023-02-16T14:12:36Z", "aliases": [ "CVE-2023-25153" ], "summary": "OCI image importer memory exhaustion in github.com/containerd/containerd", "details": "### Impact\nWhen importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.\n\n### Patches\n\nThis bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.\n\n### Workarounds\n\nEnsure that only trusted images are used and that only trusted users have permissions to import images. \n\n### Credits\n\nThe containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)\n* Email us at [security@containerd.io](mailto:security@containerd.io)\n\nTo report a security issue in containerd:\n* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)\n* Email us at [security@containerd.io](mailto:security@containerd.io)", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/containerd/containerd" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.5.18" } ] } ] }, { "package": { "ecosystem": "Go", "name": "github.com/containerd/containerd" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.6.0" }, { "fixed": "1.6.18" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25153" }, { "type": "WEB", "url": "https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4" }, { "type": "PACKAGE", "url": "https://github.com/containerd/containerd" }, { "type": "WEB", "url": "https://github.com/containerd/containerd/releases/tag/v1.5.18" }, { "type": "WEB", "url": "https://github.com/containerd/containerd/releases/tag/v1.6.18" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2023-1573" } ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-02-16T14:12:36Z", "nvd_published_at": "2023-02-16T15:15:00Z" } }