6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
33.3%
A bug was found in containerdโs CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the userโs process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerdโs CRI implementation and the stream server is used for handling container IO.
This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue.
Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
If you have any questions or comments about this advisory:
To report a security issue in containerd:
github.com/containerd/containerd
github.com/containerd/containerd/commit/241563be06a3de8b6a849414c4e805b68d3bb295
github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0
github.com/containerd/containerd/releases/tag/v1.5.16
github.com/containerd/containerd/releases/tag/v1.6.12
github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9
nvd.nist.gov/vuln/detail/CVE-2022-23471
security.gentoo.org/glsa/202401-31
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
33.3%