Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-47633
HistoryDec 04, 2023 - 9:15 p.m.

CVE-2023-47633

2023-12-0421:15:34
Alpine Linux Development Team
security.alpinelinux.org
1
traefik
http reverse proxy
cpu usage
vulnerability
versions 2.10.6
3.0.0-beta5
upgrade
docker integration

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.8%

Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

OSVersionArchitecturePackageVersionFilename
Alpine3.18-communitynoarchtraefik= 2.10.4-r4UNKNOWN
Alpine3.20-communitynoarchtraefik= 3.0.0-r2UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.8%