CVE-2022-23648

containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
References
Link Resource
http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html Exploit Third Party Advisory VDB Entry
https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 Patch Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.4.13 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.5.10 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.6.1 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/
https://security.gentoo.org/glsa/202401-31
https://www.debian.org/security/2022/dsa-5091 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html Exploit Third Party Advisory VDB Entry
https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 Patch Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.4.13 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.5.10 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/releases/tag/v1.6.1 Patch Release Notes Third Party Advisory
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/
https://security.gentoo.org/glsa/202401-31
https://www.debian.org/security/2022/dsa-5091 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

21 Nov 2024, 06:49

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 - Patch, Third Party Advisory () https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70 - Patch, Third Party Advisory
References () https://github.com/containerd/containerd/releases/tag/v1.4.13 - Patch, Release Notes, Third Party Advisory () https://github.com/containerd/containerd/releases/tag/v1.4.13 - Patch, Release Notes, Third Party Advisory
References () https://github.com/containerd/containerd/releases/tag/v1.5.10 - Patch, Release Notes, Third Party Advisory () https://github.com/containerd/containerd/releases/tag/v1.5.10 - Patch, Release Notes, Third Party Advisory
References () https://github.com/containerd/containerd/releases/tag/v1.6.1 - Patch, Release Notes, Third Party Advisory () https://github.com/containerd/containerd/releases/tag/v1.6.1 - Patch, Release Notes, Third Party Advisory
References () https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 - Third Party Advisory () https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7 - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ -
References () https://security.gentoo.org/glsa/202401-31 - () https://security.gentoo.org/glsa/202401-31 -
References () https://www.debian.org/security/2022/dsa-5091 - Mailing List, Third Party Advisory () https://www.debian.org/security/2022/dsa-5091 - Mailing List, Third Party Advisory

31 Jan 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-31 -

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'name': 'FEDORA-2022-230f2b024b', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/', 'name': 'FEDORA-2022-dc35dd101f', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/', 'name': 'FEDORA-2022-d9c9bf56f6', 'tags': ['Issue Tracking', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/ -

11 Jul 2023, 20:51

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory (MISC) http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html - Exploit, Third Party Advisory, VDB Entry
CWE CWE-200 NVD-CWE-noinfo

Information

Published : 2022-03-03 14:15

Updated : 2024-11-21 06:49


NVD link : CVE-2022-23648

Mitre link : CVE-2022-23648

CVE.ORG link : CVE-2022-23648


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

linuxfoundation

  • containerd
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo