CVE-2022-23648

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

31 Jan 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-31 -

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'name': 'FEDORA-2022-230f2b024b', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/', 'name': 'FEDORA-2022-d9c9bf56f6', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/', 'name': 'FEDORA-2022-dc35dd101f', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ -

11 Jul 2023, 20:51

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory, VDB Entry
CWE CWE-200 NVD-CWE-noinfo

25 Apr 2022, 19:21

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
References (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ - Issue Tracking, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5091 - (DEBIAN) https://www.debian.org/security/2022/dsa-5091 - Mailing List, Third Party Advisory
First Time Debian
Debian debian Linux
Fedoraproject fedora
Fedoraproject

26 Mar 2022, 19:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ -

24 Mar 2022, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html -

22 Mar 2022, 06:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ -

10 Mar 2022, 17:45

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5091 -
CWE CWE-287 CWE-200

10 Mar 2022, 14:48

Type Values Removed Values Added
CWE CWE-200 CWE-287
References (MISC) https://github.com/containerd/containerd/releases/tag/v1.5.10 - (MISC) https://github.com/containerd/containerd/releases/tag/v1.5.10 - Patch, Release Notes, Third Party Advisory
References (MISC) https://github.com/containerd/containerd/releases/tag/v1.6.1 - (MISC) https://github.com/containerd/containerd/releases/tag/v1.6.1 - Patch, Release Notes, Third Party Advisory
References (MISC) https://github.com/containerd/containerd/releases/tag/v1.4.13 - (MISC) https://github.com/containerd/containerd/releases/tag/v1.4.13 - Patch, Release Notes, Third Party Advisory
References (MISC) https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 - (MISC) https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 - (CONFIRM) https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 - Third Party Advisory
First Time Linuxfoundation containerd
Linuxfoundation
CPE cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

03 Mar 2022, 16:39

Type Values Removed Values Added
Summary containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue. containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
CWE CWE-200

03 Mar 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-03 14:15

Updated : 2024-01-31 13:15


NVD link : CVE-2022-23648

Mitre link : CVE-2022-23648

CVE.ORG link : CVE-2022-23648


JSON object : View

Products Affected

fedoraproject

  • fedora

debian

  • debian_linux

linuxfoundation

  • containerd
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor