The `/v2/_catalog` endpoint in distribution/distribution accepts a parameter to control the maximum amount of records returned (query string: `n`). This allows a malicious user to submit a unreasonably large value for `n`, causing the allocation of a massive string array, possibly causing a DoS through excessive use of memory.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:4091 https://access.redhat.com/errata/RHSA-2023:4091
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-2253
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:5155 https://access.redhat.com/errata/RHSA-2023:5155
This issue has been addressed in the following products: OADP-1.1-RHEL-8 Via RHSA-2023:5314 https://access.redhat.com/errata/RHSA-2023:5314