-
Notifications
You must be signed in to change notification settings - Fork 314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-23648: containerd CRI plugin: Insecure handling of image volumes #2821
Labels
Comments
Action required from @Azure/aks-pm |
miwithro
removed
action-required
Needs Attention 👋
Issues needs attention/assignee/owner
labels
Apr 4, 2022
ghost
added
the
action-required
label
May 7, 2022
Action required from @Azure/aks-pm |
Issue needing attention of @Azure/aks-leads |
1 similar comment
Issue needing attention of @Azure/aks-leads |
CocoWang-wql
added
announcement
resolution/answer-provided
Provided answer to issue, question or feedback.
and removed
action-required
Needs Attention 👋
Issues needs attention/assignee/owner
labels
Jun 12, 2022
Thanks for reaching out. I'm closing this issue as it was marked with "Answer Provided" and it hasn't had activity for 2 days. |
ghost
closed this as completed
Jun 14, 2022
ghost
locked as resolved and limited conversation to collaborators
Jul 14, 2022
This issue was closed.
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
Impact
A bug was found in containerd where containers launched through containerd’s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
GHSA-crp2-qrr5-8pq7
Patches
Patches are attached for containerd 1.6.x, 1.5.x, and 1.4.x. This bug will be fixed in new upstream releases of containerd: 1.6.1, 1.5.11 and 1.4.13.
Workarounds
Ensure that only trusted images are used.
AKS Information:
Update your node image to 2022.03.02 to remediate this vulnerability.
The text was updated successfully, but these errors were encountered: