The remote host is missing an update for the Huawei EulerOS 'docker-engine' package(s) announced via the EulerOS-SA-2023-1521 advisory. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue
Reporter | Title | Published | Views | Family All 101 |
---|---|---|---|---|
Veracode | Denial Of Service (DoS) | 8 Dec 202203:54 | โ | veracode |
NVD | CVE-2022-23471 | 7 Dec 202223:15 | โ | nvd |
Debian CVE | CVE-2022-23471 | 7 Dec 202223:15 | โ | debiancve |
Redos | ROS-20221223-01 | 23 Dec 202200:00 | โ | redos |
OSV | containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd | 21 Aug 202416:03 | โ | osv |
OSV | CGA-hc4p-65g6-x5p4 | 6 Jun 202412:27 | โ | osv |
OSV | CGA-57rr-rppf-cc3f | 6 Jun 202412:24 | โ | osv |
OSV | containerd-1.6.12-1.1 on GA media | 15 Jun 202400:00 | โ | osv |
OSV | CVE-2022-23471 | 7 Dec 202223:15 | โ | osv |
OSV | containerd CRI stream server vulnerable to host memory exhaustion via terminal | 7 Dec 202223:23 | โ | osv |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2023.1521");
script_cve_id("CVE-2022-23471");
script_tag(name:"creation_date", value:"2023-03-20 08:10:36 +0000 (Mon, 20 Mar 2023)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-12-12 14:53:58 +0000 (Mon, 12 Dec 2022)");
script_name("Huawei EulerOS: Security Advisory for docker-engine (EulerOS-SA-2023-1521)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS\-2\.0SP10");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2023-1521");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2023-1521");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'docker-engine' package(s) announced via the EulerOS-SA-2023-1521 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.(CVE-2022-23471)");
script_tag(name:"affected", value:"'docker-engine' package(s) on Huawei EulerOS V2.0SP10.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod", value:"30");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP10") {
if(!isnull(res = isrpmvuln(pkg:"docker-engine", rpm:"docker-engine~1:18.09.0~200.h62.33.19.eulerosv2r10", rls:"EULEROS-2.0SP10"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo