Bug 1200285 - (CVE-2022-1708) VUL-0: CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube API
(CVE-2022-1708)
VUL-0: CVE-2022-1708: cri-o: memory exhaustion on the node when access to the...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Michal Jura
Security Team bot
https://smash.suse.de/issue/333695/
CVSSv3.1:SUSE:CVE-2022-1708:6.8:(AV:N...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-06-07 13:18 UTC by Carlos López
Modified: 2022-12-29 17:19 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-06-07 13:18:49 UTC
rh#2085361

A vulnerability was found in CRI-O that causes memory exhaustion on the node for anyone with access to the kube api. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by cri-o after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory of the node when crio reads output of the command.

References: 
https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2085361
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1708
Comment 1 Carlos López 2022-06-07 13:20:01 UTC
We ship the following versions:
 - openSUSE:Factory    1.23.2
 - openSUSE:Leap:15.4  1.22.0
 - openSUSE:Leap:15.3  1.17.3
 - SUSE:SLE-15-SP1:Update:Products:CASP40:Update  1.19.6

Patched versions: 1.24.1, 1.23.3, 1.22.5, 1.21.8, 1.20.8, 1.19.7
Comment 2 OBSbugzilla Bot 2022-07-25 04:40:03 UTC
This is an autogenerated message for OBS integration:
This bug (1200285) was mentioned in
https://build.opensuse.org/request/show/990918 Factory / cri-o
Comment 5 Michal Jura 2022-09-02 08:58:20 UTC
New cri-o v1.19.7 was build and submitted to Update repo

https://build.suse.de/project/requests/Devel:CaaSP:4.0:Staging:4.2.9
Comment 10 Swamp Workflow Management 2022-10-18 19:19:54 UTC
SUSE-SU-2022:3637-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1200285
CVE References: CVE-2022-1708
JIRA References: 
Sources used:
SUSE CaaS Platform 4.0 (src):    caasp-release-4.2.9-150100.24.52.1, cri-o-1.19.7-150100.3.50.1, release-notes-caasp-4.2.20220921-150100.4.80.1, skuba-1.4.16-150100.3.65.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-11-08 14:28:10 UTC
SUSE-SU-2022:3896-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1200285
CVE References: CVE-2022-1708
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    conmon-2.1.3-150100.3.9.1
SUSE Manager Retail Branch Server 4.1 (src):    conmon-2.1.3-150100.3.9.1
SUSE Manager Proxy 4.1 (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    conmon-2.1.3-150100.3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    conmon-2.1.3-150100.3.9.1
SUSE Enterprise Storage 7 (src):    conmon-2.1.3-150100.3.9.1
SUSE Enterprise Storage 6 (src):    conmon-2.1.3-150100.3.9.1
SUSE CaaS Platform 4.0 (src):    conmon-2.1.3-150100.3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2022-12-22 14:21:30 UTC
SUSE-SU-2022:4607-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1200285
CVE References: CVE-2022-1708
JIRA References: 
Sources used:
openSUSE Leap Micro 5.2 (src):    conmon-2.1.5-150300.8.6.1
openSUSE Leap 15.3 (src):    conmon-2.1.5-150300.8.6.1
SUSE Linux Enterprise Module for Containers 15-SP3 (src):    conmon-2.1.5-150300.8.6.1
SUSE Linux Enterprise Micro 5.2 (src):    conmon-2.1.5-150300.8.6.1
SUSE Linux Enterprise Micro 5.1 (src):    conmon-2.1.5-150300.8.6.1
SUSE Enterprise Storage 7.1 (src):    conmon-2.1.5-150300.8.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Swamp Workflow Management 2022-12-29 17:19:32 UTC
SUSE-SU-2022:4635-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1200285
CVE References: CVE-2022-1708
JIRA References: 
Sources used:
openSUSE Leap Micro 5.3 (src):    conmon-2.1.5-150400.3.3.1
openSUSE Leap 15.4 (src):    conmon-2.1.5-150400.3.3.1
SUSE Linux Enterprise Module for Containers 15-SP4 (src):    conmon-2.1.5-150400.3.3.1
SUSE Linux Enterprise Micro 5.3 (src):    conmon-2.1.5-150400.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.