Bugzilla – Bug 1200285
VUL-0: CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube API
Last modified: 2022-12-29 17:19:32 UTC
rh#2085361 A vulnerability was found in CRI-O that causes memory exhaustion on the node for anyone with access to the kube api. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by cri-o after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory of the node when crio reads output of the command. References: https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j References: https://bugzilla.redhat.com/show_bug.cgi?id=2085361 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1708
We ship the following versions: - openSUSE:Factory 1.23.2 - openSUSE:Leap:15.4 1.22.0 - openSUSE:Leap:15.3 1.17.3 - SUSE:SLE-15-SP1:Update:Products:CASP40:Update 1.19.6 Patched versions: 1.24.1, 1.23.3, 1.22.5, 1.21.8, 1.20.8, 1.19.7
This is an autogenerated message for OBS integration: This bug (1200285) was mentioned in https://build.opensuse.org/request/show/990918 Factory / cri-o
New cri-o v1.19.7 was build and submitted to Update repo https://build.suse.de/project/requests/Devel:CaaSP:4.0:Staging:4.2.9
SUSE-SU-2022:3637-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1200285 CVE References: CVE-2022-1708 JIRA References: Sources used: SUSE CaaS Platform 4.0 (src): caasp-release-4.2.9-150100.24.52.1, cri-o-1.19.7-150100.3.50.1, release-notes-caasp-4.2.20220921-150100.4.80.1, skuba-1.4.16-150100.3.65.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3896-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1200285 CVE References: CVE-2022-1708 JIRA References: Sources used: SUSE Manager Server 4.1 (src): conmon-2.1.3-150100.3.9.1 SUSE Manager Retail Branch Server 4.1 (src): conmon-2.1.3-150100.3.9.1 SUSE Manager Proxy 4.1 (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): conmon-2.1.3-150100.3.9.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): conmon-2.1.3-150100.3.9.1 SUSE Enterprise Storage 7 (src): conmon-2.1.3-150100.3.9.1 SUSE Enterprise Storage 6 (src): conmon-2.1.3-150100.3.9.1 SUSE CaaS Platform 4.0 (src): conmon-2.1.3-150100.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4607-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1200285 CVE References: CVE-2022-1708 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): conmon-2.1.5-150300.8.6.1 openSUSE Leap 15.3 (src): conmon-2.1.5-150300.8.6.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): conmon-2.1.5-150300.8.6.1 SUSE Linux Enterprise Micro 5.2 (src): conmon-2.1.5-150300.8.6.1 SUSE Linux Enterprise Micro 5.1 (src): conmon-2.1.5-150300.8.6.1 SUSE Enterprise Storage 7.1 (src): conmon-2.1.5-150300.8.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4635-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1200285 CVE References: CVE-2022-1708 JIRA References: Sources used: openSUSE Leap Micro 5.3 (src): conmon-2.1.5-150400.3.3.1 openSUSE Leap 15.4 (src): conmon-2.1.5-150400.3.3.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): conmon-2.1.5-150400.3.3.1 SUSE Linux Enterprise Micro 5.3 (src): conmon-2.1.5-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.