187
VMScore

CVE-2022-31030

Published: 09/06/2022 Updated: 31/01/2024
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that containerd incorrectly handled access to encrypted container images when using imgcrypt library. A remote attacker could possibly use this issue to access encrypted images from other users. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24778)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation containerd

debian debian linux 11.0

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Several security issues were fixed in containerd ...
Two vulnerabilities were discovered in the containerd container runtime, which could result in denial of service or incomplete restriction of capabilities For the stable distribution (bullseye), these problems have been fixed in version 1413~ds1-1~deb11u2 We recommend that you upgrade your containerd packages For the detailed security status o ...
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads Kubernetes and crictl can both be config ...
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads Kubernetes and crictl can both be config ...
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads Kubernetes and crictl can both be config ...
programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API and cause containerd to consume all available memory on the computer ...
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads Kubernetes and crictl can both be config ...
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads Kubernetes and crictl can both be config ...
A bug was found in containerd where containers launched through containerd's CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose pot ...