Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-13674.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-13674
Upstream
Published
2023-02-16T15:15:19Z
Modified
2026-04-01T05:07:45.015066Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
CVE-2023-25153 affecting package moby-containerd for versions less than 1.6.18-2
Details

containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

References

Affected packages

Azure Linux:2 / moby-containerd

Package

Name
moby-containerd
Purl
pkg:rpm/azure-linux/moby-containerd

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.18-2

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-13674.json"