Логотип exploitDog
bind:"BDU:2022-07471" OR bind:"CVE-2022-23471"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-07471" OR bind:"CVE-2022-23471"

Количество 11

Количество 11

fstec логотип

BDU:2022-07471

больше 2 лет назад

Уязвимость среды выполнения контейнеров containerd, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2022-23471

больше 2 лет назад

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2022-23471

больше 2 лет назад

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
EPSS: Низкий
msrc логотип

CVE-2022-23471

больше 2 лет назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-23471

больше 2 лет назад

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1628-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1566-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20221223-01

больше 2 лет назад

Уязвимость containerd

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2qjp-425j-52j9

больше 2 лет назад

containerd CRI stream server vulnerable to host memory exhaustion via terminal

CVSS3: 5.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4463-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4409-1

больше 2 лет назад

Security update for containerd

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-07471

Уязвимость среды выполнения контейнеров containerd, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 6.5
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-23471

containerd is an open source container runtime. A bug was found in con ...

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1628-1

Security update for containerd

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1566-1

Security update for containerd

0%
Низкий
больше 2 лет назад
redos логотип
ROS-20221223-01

Уязвимость containerd

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-2qjp-425j-52j9

containerd CRI stream server vulnerable to host memory exhaustion via terminal

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4463-1

Security update for containerd

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4409-1

Security update for containerd

больше 2 лет назад

Уязвимостей на страницу