CVE-2022-23648

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
References
Link Resource
http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html Exploit Third Party Advisory VDB Entry
https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 Patch Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.4.13 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.5.10 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.6.1 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/
https://security.gentoo.org/glsa/202401-31
https://www.debian.org/security/2022/dsa-5091 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html Exploit Third Party Advisory VDB Entry
https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 Patch Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.4.13 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.5.10 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.6.1 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/
https://security.gentoo.org/glsa/202401-31
https://www.debian.org/security/2022/dsa-5091 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-03-03 14:15

Updated : 2024-11-21 06:49


NVD link : CVE-2022-23648

Mitre link : CVE-2022-23648

CVE.ORG link : CVE-2022-23648


JSON object : View

Products Affected

linuxfoundation

  • containerd

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo