6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%
A deadlock vulnerability was found in ‘github.com/containers/storage’ in
versions before 1.28.1. When a container image is processed, each layer is
unpacked using tar
. If one of those layers is not a valid tar
archive
this causes an error leading to an unexpected situation where the code
indefinitely waits for the tar unpacked stream, which never finishes. An
attacker could use this vulnerability to craft a malicious image, which
when downloaded and stored by an application using containers/storage,
would then cause a deadlock leading to a Denial of Service (DoS).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | golang-github-containers-storage | < any | UNKNOWN |
ubuntu | 22.04 | noarch | golang-github-containers-storage | < any | UNKNOWN |
ubuntu | 23.10 | noarch | golang-github-containers-storage | < any | UNKNOWN |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.005 Low
EPSS
Percentile
76.6%