Skip to content

Commit

Permalink
data/reports: add GO-2023-1573.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-25153, GHSA-259w-8hf6-59c2

Fixes #1573

Change-Id: I89f90695dd813ea446fb2ed6e521edb4075173ab
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/468995
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Tim King <taking@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
  • Loading branch information
timothy-king committed Feb 17, 2023
1 parent 2d838f9 commit ece9a05
Show file tree
Hide file tree
Showing 2 changed files with 136 additions and 0 deletions.
102 changes: 102 additions & 0 deletions data/osv/GO-2023-1573.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,102 @@
{
"id": "GO-2023-1573",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25153",
"GHSA-259w-8hf6-59c2"
],
"details": "When importing an OCI image, there was no limit on the number of bytes read from the io.Reader passed into ImportIndex. A large number of bytes could be read from this and could cause a denial of service.",
"affected": [
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.18"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1573"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/images/archive",
"symbols": [
"ImportIndex",
"onUntarJSON"
]
}
]
}
},
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.18"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1573"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/images/archive",
"symbols": [
"ImportIndex",
"onUntarJSON"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2"
},
{
"type": "FIX",
"url": "https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4"
},
{
"type": "WEB",
"url": "https://github.com/containerd/containerd/releases/tag/v1.5.18"
},
{
"type": "WEB",
"url": "https://github.com/containerd/containerd/releases/tag/v1.6.18"
}
],
"credits": [
{
"name": "@AdamKorcz and @DavidKorczynski"
}
],
"schema_version": "1.3.1"
}
34 changes: 34 additions & 0 deletions data/reports/GO-2023-1573.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
modules:
- module: github.com/containerd/containerd
versions:
- introduced: 1.6.0
fixed: 1.6.18
vulnerable_at: 1.6.0
packages:
- package: github.com/containerd/containerd/images/archive
symbols:
- onUntarJSON
- ImportIndex
- module: github.com/containerd/containerd
versions:
- fixed: 1.5.18
vulnerable_at: 1.5.17
packages:
- package: github.com/containerd/containerd/images/archive
symbols:
- onUntarJSON
- ImportIndex
description: |
When importing an OCI image, there was no limit on the number of bytes
read from the io.Reader passed into ImportIndex. A large number of bytes could be
read from this and could cause a denial of service.
cves:
- CVE-2023-25153
ghsas:
- GHSA-259w-8hf6-59c2
credit: '@AdamKorcz and @DavidKorczynski'
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2
- fix: https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4
- web: https://github.com/containerd/containerd/releases/tag/v1.5.18
- web: https://github.com/containerd/containerd/releases/tag/v1.6.18

0 comments on commit ece9a05

Please sign in to comment.