CVE-2023-25153

containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18.  Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.2 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
6.2 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 31%
VendorProductVersion
linuxfoundationcontainerd
𝑥
< 1.5.18
linuxfoundationcontainerd
1.6.0 ≤
𝑥
< 1.6.18
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
containerd
bullseye
1.4.13~ds1-1~deb11u4
fixed
bullseye (security)
vulnerable
bookworm
1.6.20~ds1-1
fixed
trixie
1.7.24~ds1-4
fixed
sid
1.7.24~ds1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
containerd
lunar
Fixed 1.6.12-0ubuntu3.1
released
kinetic
Fixed 1.6.12-0ubuntu1~22.10.2
released
jammy
Fixed 1.6.12-0ubuntu1~22.04.3
released
focal
Fixed 1.6.12-0ubuntu1~20.04.3
released
bionic
Fixed 1.6.12-0ubuntu1~18.04.1+esm1
released
xenial
Fixed 1.2.6-0ubuntu1~16.04.6+esm4
released
trusty
ignored