Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-2879

Опубликовано: 04 окт. 2022
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.

Отчет

The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang’s Garbage Collector; OpenShift’s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations. This flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServiceshelmFix deferred
OpenShift Developer Tools and ServicesodoAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/prometheus-rhel8Affected
Red Hat Advanced Cluster Security 3advanced-cluster-security/rhacs-main-rhel8Affected
Red Hat AMQ Broker 7amq-broker-rhel8-operator-containerAffected
Red Hat Ansible Automation Platform 2openshift-clientsAffected
Red Hat Application Interconnect 1.0skupper-cliAffected
Red Hat Ceph Storage 3golangOut of support scope
Red Hat Enterprise Linux 8container-tools:3.0/buildahWill not fix
Red Hat Enterprise Linux 8container-tools:3.0/podmanAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2132867golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers

EPSS

Процентиль: 2%
0.00015
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

CVSS3: 7.5
nvd
больше 2 лет назад

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

CVSS3: 7.5
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

Reader.Read does not set a limit on the maximum size of file headers. ...

CVSS3: 7.5
github
больше 2 лет назад

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

EPSS

Процентиль: 2%
0.00015
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2022-2879