Логотип exploitDog
bind:"GHSA-2qjp-425j-52j9" OR bind:"CVE-2022-23471"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-2qjp-425j-52j9" OR bind:"CVE-2022-23471"

Количество 11

Количество 11

github логотип

GHSA-2qjp-425j-52j9

почти 3 года назад

containerd CRI stream server vulnerable to host memory exhaustion via terminal

CVSS3: 5.7
EPSS: Низкий
ubuntu логотип

CVE-2022-23471

почти 3 года назад

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2022-23471

почти 3 года назад

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
EPSS: Низкий
msrc логотип

CVE-2022-23471

почти 3 года назад

containerd CRI stream server: Host memory exhaustion through terminal resize goroutine leak

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-23471

почти 3 года назад

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1628-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1566-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20221223-01

почти 3 года назад

Уязвимость containerd

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2022-07471

почти 3 года назад

Уязвимость среды выполнения контейнеров containerd, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4463-1

почти 3 года назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4409-1

почти 3 года назад

Security update for containerd

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2qjp-425j-52j9

containerd CRI stream server vulnerable to host memory exhaustion via terminal

CVSS3: 5.7
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
0%
Низкий
почти 3 года назад
msrc логотип
CVE-2022-23471

containerd CRI stream server: Host memory exhaustion through terminal resize goroutine leak

CVSS3: 6.5
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.7
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1628-1

Security update for containerd

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1566-1

Security update for containerd

0%
Низкий
больше 2 лет назад
redos логотип
ROS-20221223-01

Уязвимость containerd

CVSS3: 6.5
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-07471

Уязвимость среды выполнения контейнеров containerd, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

CVSS3: 6.5
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4463-1

Security update for containerd

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4409-1

Security update for containerd

почти 3 года назад

Уязвимостей на страницу