CVE-2023-25153Allocation of Resources Without Limits or Throttling in Containerd

Severity
5.5MEDIUMNVD
CNA6.2
EPSS
0.2%
top 59.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 16
Latest updateJul 5

Description

containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

CVEListV5containerd/containerd< 1.5.18+1
NVDlinuxfoundation/containerd1.6.01.6.18+1
Gogithub.com/containerd_containerd1.6.01.6.18+1
Debiancontainerd/containerd< 1.4.13~ds1-1~deb11u4+3
Ubuntucontainerd/containerd< 1.6.12-0ubuntu1~20.04.3+3

Patches

🔴Vulnerability Details

6
OSV
containerd vulnerabilities2023-07-05
OSV
Memory exhaustion via OCI image importer in github.com/containerd/containerd2023-02-17
CVEList
containerd OCI image importer memory exhaustion2023-02-16
GHSA
OCI image importer memory exhaustion in github.com/containerd/containerd2023-02-16
OSV
CVE-2023-25153: containerd is an open source container runtime2023-02-16

📋Vendor Advisories

4
Ubuntu
containerd vulnerabilities2023-07-05
Red Hat
containerd: OCI image importer memory exhaustion2023-02-15
Microsoft
containerd OCI image importer memory exhaustion2023-02-14
Debian
CVE-2023-25153: containerd - containerd is an open source container runtime. Before versions 1.6.18 and 1.5.1...2023
CVE-2023-25153 — Containerd vulnerability | cvebase