{
  "threat_severity" : "Moderate",
  "public_date" : "2023-05-09T15:00:00Z",
  "bugzilla" : {
    "description" : "distribution/distribution: DoS from malicious API request",
    "id" : "2189886",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2189886"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-770",
  "details" : [ "A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.", "A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory." ],
  "acknowledgement" : "Red Hat would like to thank Jose Gomez (SUSE) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "OADP-1.1-RHEL-8",
    "release_date" : "2023-09-20T00:00:00Z",
    "advisory" : "RHSA-2023:5314",
    "cpe" : "cpe:/a:redhat:openshift_api_data_protection:1.1::el8",
    "package" : "oadp/oadp-velero-plugin-rhel8:1.1.6-5"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.11",
    "release_date" : "2023-10-18T00:00:00Z",
    "advisory" : "RHSA-2023:5697",
    "cpe" : "cpe:/a:redhat:openshift:4.11::el8",
    "package" : "openshift4/ose-docker-registry:v4.11.0-202310101543.p0.g431737b.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.12",
    "release_date" : "2023-10-04T00:00:00Z",
    "advisory" : "RHSA-2023:5390",
    "cpe" : "cpe:/a:redhat:openshift:4.12::el8",
    "package" : "openshift4/ose-docker-registry:v4.12.0-202309261625.p0.g9e75355.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2023-09-19T00:00:00Z",
    "advisory" : "RHSA-2023:5155",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el8",
    "package" : "openshift4/ose-docker-registry:v4.13.0-202309120502.p0.gdb5611b.assembly.stream"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Developer Tools and Services",
    "fix_state" : "Affected",
    "package_name" : "helm",
    "cpe" : "cpe:/a:redhat:ocp_tools"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Will not fix",
    "package_name" : "openshift4/ose-console",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "openshift4/ose-openshift-apiserver-rhel8",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-2253\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2253\nhttps://www.openwall.com/lists/oss-security/2023/05/09/1" ],
  "name" : "CVE-2023-2253",
  "csaw" : false
}