OESA-2023-1824

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1824
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1824.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1824
Upstream
Published
2023-11-17T11:06:17Z
Modified
2025-08-12T05:18:35.805542Z
Summary
skopeo security update
Details

A command line utility that performs various operations on container images and image repositories

Security Fix(es):

HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.(CVE-2023-24534)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / skopeo

Package

Name
skopeo
Purl
pkg:rpm/openEuler/skopeo&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.2-3.oe2203sp1

Ecosystem specific

{
    "x86_64": [
        "containers-common-1.5.2-3.oe2203sp1.x86_64.rpm",
        "skopeo-debugsource-1.5.2-3.oe2203sp1.x86_64.rpm",
        "skopeo-1.5.2-3.oe2203sp1.x86_64.rpm",
        "skopeo-debuginfo-1.5.2-3.oe2203sp1.x86_64.rpm"
    ],
    "src": [
        "skopeo-1.5.2-3.oe2203sp1.src.rpm"
    ],
    "aarch64": [
        "skopeo-debugsource-1.5.2-3.oe2203sp1.aarch64.rpm",
        "skopeo-1.5.2-3.oe2203sp1.aarch64.rpm",
        "containers-common-1.5.2-3.oe2203sp1.aarch64.rpm",
        "skopeo-debuginfo-1.5.2-3.oe2203sp1.aarch64.rpm"
    ]
}