First published: Wed Mar 02 2022(Updated: )
### Impact A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. ### Patches This bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images are used. ### Credits The containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md). ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Containerd | <1.4.13 | |
Linuxfoundation Containerd | >=1.5.0<1.5.10 | |
Linuxfoundation Containerd | >=1.6.0<1.6.1 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
debian/containerd | 1.4.13~ds1-1~deb11u4 1.4.13~ds1-1~deb11u2 1.6.20~ds1-1 1.6.20~ds1-2 | |
go/github.com/containerd/containerd | >=1.6.0<1.6.1 | 1.6.1 |
go/github.com/containerd/containerd | >=1.5.0<1.5.10 | 1.5.10 |
go/github.com/containerd/containerd | <1.4.13 | 1.4.13 |
<1.4.13 | ||
>=1.5.0<1.5.10 | ||
>=1.6.0<1.6.1 | ||
=11.0 | ||
=34 | ||
=35 | ||
=36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-23648 is high with a CVSS score of 7.5.
containerd versions prior to 1.4.13, 1.5.10, and 1.6.1 are affected by CVE-2022-23648.
Containers launched through containerd's CRI implementation on Linux with a specially-crafted image configuration can gain unauthorized read access.
No, containerd on Windows is not affected by CVE-2022-23648.
To fix CVE-2022-23648, update containerd to versions 1.6.1, 1.5.10, or 1.4.13, depending on the affected version.