Miggo Logo

CVE-2022-1708: Node DOS by way of memory exhaustion through ExecSync request in CRI-O

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.58627%
Published
6/6/2022
Updated
7/24/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cri-o/cri-ogo= 1.24.01.24.1
github.com/cri-o/cri-ogo>= 1.23.0, < 1.23.31.23.3
github.com/cri-o/cri-ogo< 1.22.51.22.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from CRI-O's handling of ExecSync output. The commit fixes include: (1) Adding a max size cap when reading the log file (replacing ioutil.ReadFile with TruncateAndReadFile in runtime_oci.go), and (2) Introducing LimitWriter to constrain buffer growth in runtime_vm.go. The original functions lacked these safeguards, making them directly vulnerable to resource exhaustion. The patch explicitly addresses these points, confirming the vulnerability's root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription *n *x**Syn* r*qu*st runs * *omm*n* in * *ont*in*r *n* r*turns t** output to t** Ku**l*t. It is us** *or r***in*ss *n* liv*n*ss pro**s wit*in * po*. T** w*y *RI-O runs *x**Syn* *omm*n*s is t*rou** *onmon. *RI-O *sks *onmon to st*rt t**

Reasoning

T** vuln*r**ility st*ms *rom *RI-O's **n*lin* o* *x**Syn* output. T** *ommit *ix*s in*lu**: (*) ***in* * m*x siz* **p w**n r***in* t** lo* *il* (r*pl**in* ioutil.R****il* wit* Trun**t**n*R****il* in runtim*_o*i.*o), *n* (*) Intro*u*in* LimitWrit*r to