blob: eb0f8fe542a0619ebb4aca69b867181738deb7be [file] [log] [blame]
packages:
- module: github.com/docker/distribution
package: github.com/docker/distribution/registry/handlers
symbols:
- copyFullPayload
derived_symbols:
- blobUploadHandler.PatchBlobData
- blobUploadHandler.PutBlobUploadComplete
- imageManifestHandler.GetImageManifest
- imageManifestHandler.PutImageManifest
versions:
- fixed: 2.7.0-rc.0+incompatible
- module: github.com/docker/distribution
package: github.com/docker/distribution/registry/storage
symbols:
- blobStore.Get
derived_symbols:
- PurgeUploads
- Walk
- blobStore.Enumerate
- blobStore.Get
- linkedBlobStore.Enumerate
- linkedBlobStore.Get
- manifestStore.Enumerate
- manifestStore.Get
- registry.Enumerate
- registry.Repositories
versions:
- fixed: 2.7.0-rc.0+incompatible
description: |
Various storage methods do not impose limits on how much content is accepted
from user requests, allowing a malicious user to force the caller to allocate
an arbitrary amount of memory.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-11468
links:
pr: https://github.com/distribution/distribution/pull/2340
commit: https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f
context:
- https://access.redhat.com/errata/RHSA-2017:2603
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html