Security Advisory for containerd. Bug found in containerd's CRI implementation causing memory exhaustion. Users should update to containerd 1.6.12 or 1.5.16
Reporter | Title | Published | Views | Family All 101 |
---|---|---|---|---|
Veracode | Denial Of Service (DoS) | 8 Dec 202203:54 | โ | veracode |
NVD | CVE-2022-23471 | 7 Dec 202223:15 | โ | nvd |
Debian CVE | CVE-2022-23471 | 7 Dec 202223:15 | โ | debiancve |
Redos | ROS-20221223-01 | 23 Dec 202200:00 | โ | redos |
OpenVAS | Huawei EulerOS: Security Advisory for docker-engine (EulerOS-SA-2023-1521) | 20 Mar 202300:00 | โ | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for containerd (EulerOS-SA-2023-1462) | 9 Mar 202300:00 | โ | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for docker-engine (EulerOS-SA-2023-1546) | 20 Mar 202300:00 | โ | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for containerd (EulerOS-SA-2023-1580) | 23 Mar 202300:00 | โ | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:1628-1) | 28 Mar 202300:00 | โ | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for containerd (EulerOS-SA-2023-1437) | 9 Mar 202300:00 | โ | openvas |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2023.1570");
script_cve_id("CVE-2022-23471");
script_tag(name:"creation_date", value:"2023-03-23 09:39:24 +0000 (Thu, 23 Mar 2023)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-12-12 14:53:58 +0000 (Mon, 12 Dec 2022)");
script_name("Huawei EulerOS: Security Advisory for containerd (EulerOS-SA-2023-1570)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS\-2\.0SP11");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2023-1570");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2023-1570");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'containerd' package(s) announced via the EulerOS-SA-2023-1570 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.(CVE-2022-23471)");
script_tag(name:"affected", value:"'containerd' package(s) on Huawei EulerOS V2.0SP11.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP11") {
if(!isnull(res = isrpmvuln(pkg:"docker-engine", rpm:"docker-engine~18.09.0~300.h26.34.27.eulerosv2r11", rls:"EULEROS-2.0SP11"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo