Bug 1204024 (CVE-2022-2879) - VUL-0: CVE-2022-2879: go1.18,go1.19: archive/tar: unbounded memory consumption when reading headers
Summary: VUL-0: CVE-2022-2879: go1.18,go1.19: archive/tar: unbounded memory consumptio...
Status: RESOLVED FIXED
Alias: CVE-2022-2879
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/344235/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-2879:7.5:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-04 21:16 UTC by Jeff Kowalczyk
Modified: 2024-03-27 14:40 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jeff Kowalczyk 2022-10-04 21:16:37 UTC
Reader.Read did not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. Reader.Read now limits the maximum size of header blocks to 1 MiB.

Thanks to Adam Korczynski (ADA Logics) and OSS-Fuzz for reporting this issue.

This is CVE-2022-2879 and Go issue https://go.dev/issue/54853.
Comment 1 OBSbugzilla Bot 2022-10-05 03:35:08 UTC
This is an autogenerated message for OBS integration:
This bug (1204024) was mentioned in
https://build.opensuse.org/request/show/1008077 Factory / go1.18
https://build.opensuse.org/request/show/1008078 Factory / go1.19
Comment 3 Swamp Workflow Management 2022-10-20 01:20:28 UTC
SUSE-SU-2022:3669-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1200441,1204023,1204024,1204025
CVE References: CVE-2022-2879,CVE-2022-2880,CVE-2022-41715
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    go1.19-1.19.2-150000.1.12.1
openSUSE Leap 15.3 (src):    go1.19-1.19.2-150000.1.12.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    go1.19-1.19.2-150000.1.12.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    go1.19-1.19.2-150000.1.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Swamp Workflow Management 2022-10-20 01:21:29 UTC
SUSE-SU-2022:3668-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1193742,1204023,1204024,1204025
CVE References: CVE-2022-2879,CVE-2022-2880,CVE-2022-41715
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    go1.18-1.18.7-150000.1.34.1
openSUSE Leap 15.3 (src):    go1.18-1.18.7-150000.1.34.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    go1.18-1.18.7-150000.1.34.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    go1.18-1.18.7-150000.1.34.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Marcus Meissner 2022-12-05 14:20:29 UTC
done
Comment 7 Maintenance Automation 2023-05-30 08:30:07 UTC
SUSE-SU-2023:2312-1: An update that solves 28 vulnerabilities, contains one feature and has three fixes can now be installed.

Category: security (important)
Bug References: 1183043, 1193742, 1198423, 1198424, 1198427, 1199413, 1200134, 1200135, 1200136, 1200137, 1201434, 1201436, 1201437, 1201440, 1201443, 1201444, 1201445, 1201447, 1201448, 1202035, 1203185, 1204023, 1204024, 1204025, 1204941, 1206134, 1206135, 1208270, 1208271, 1208272, 1208491
CVE References: CVE-2022-1705, CVE-2022-1962, CVE-2022-24675, CVE-2022-27536, CVE-2022-27664, CVE-2022-28131, CVE-2022-28327, CVE-2022-2879, CVE-2022-2880, CVE-2022-29526, CVE-2022-29804, CVE-2022-30580, CVE-2022-30629, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633, CVE-2022-30634, CVE-2022-30635, CVE-2022-32148, CVE-2022-32189, CVE-2022-41715, CVE-2022-41716, CVE-2022-41717, CVE-2022-41720, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725
Jira References: PED-1962
Sources used:
openSUSE Leap 15.4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
openSUSE Leap 15.5 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
Development Tools Module 15-SP4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Linux Enterprise Real Time 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1
SUSE Enterprise Storage 7.1 (src): go1.18-openssl-1.18.10.1-150000.1.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.