CVE-2022-23648 - log back

CVE-2022-23648 created at 18 May 2022 19:58:43
Severity
+ Unknown
Remote
+ Unknown
Type
+ Information disclosure
Description
+ containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
References
+ https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70
+ https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7
+ https://github.com/containerd/containerd/releases/tag/v1.6.1
Notes
+ Workarounds: Ensure that only trusted images are used.