CVE-2023-23916

ADVISORY - nist

Summary

An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

EPSS Score: 0.0006 (0.189)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Allocation of Resources Without Limits or Throttling

ADVISORY - alpine

Allocation of Resources Without Limits or Throttling

ADVISORY - debian

Allocation of Resources Without Limits or Throttling

ADVISORY - ubuntu

Allocation of Resources Without Limits or Throttling

ADVISORY - redhat

Allocation of Resources Without Limits or Throttling

ADVISORY - photon

Allocation of Resources Without Limits or Throttling

ADVISORY - inthewild

Allocation of Resources Without Limits or Throttling


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in