CVE-2022-23648 log
| Source |
|
| Severity | Unknown |
| Remote | Unknown |
| Type | Information disclosure |
| Description | containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-2725 | containerd | 1.6.0-2 | 1.6.1-1 | Unknown | Unknown |
| Notes |
|---|
Workarounds: Ensure that only trusted images are used. |