First published: Wed Dec 07 2022(Updated: )
### Impact A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. ### Patches This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Containerd | <1.5.16 | |
Linuxfoundation Containerd | >=1.6.0<1.6.12 | |
go/github.com/containerd/containerd | >=1.6.0<1.6.12 | 1.6.12 |
go/github.com/containerd/containerd | <1.5.16 | 1.5.16 |
<1.5.16 | ||
>=1.6.0<1.6.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23471 is a vulnerability in containerd, an open source container runtime, that allows a user to exhaust memory on the host.
Linuxfoundation Containerd versions 1.5.16 and between 1.6.0 to 1.6.12 are affected by CVE-2022-23471.
CVE-2022-23471 has a severity rating of 6.5 (medium).
To fix CVE-2022-23471, upgrade containerd to a version that is not affected by the vulnerability.
More information about CVE-2022-23471 can be found in the GitHub references provided.