CVE-2022-1708: Node DOS by way of memory exhaustion through ExecSync request in CRI-O
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58627%
CWE
Published
6/6/2022
Updated
7/24/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/cri-o/cri-o | go | = 1.24.0 | 1.24.1 |
| github.com/cri-o/cri-o | go | >= 1.23.0, < 1.23.3 | 1.23.3 |
| github.com/cri-o/cri-o | go | < 1.22.5 | 1.22.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from CRI-O's handling of ExecSync output. The commit fixes include: (1) Adding a max size cap when reading the log file (replacing ioutil.ReadFile with TruncateAndReadFile in runtime_oci.go), and (2) Introducing LimitWriter to constrain buffer growth in runtime_vm.go. The original functions lacked these safeguards, making them directly vulnerable to resource exhaustion. The patch explicitly addresses these points, confirming the vulnerability's root cause.