{"id":"MGASA-2022-0088","summary":"Updated docker-containerd packages fix security vulnerability","details":"A bug was found in containerd where containers launched through containerd’s\nCRI implementation with a specially-crafted image configuration could gain\naccess to read-only copies of arbitrary files and directories on the host.\nThis may bypass any policy-based enforcement on container setup (including\na Kubernetes Pod Security Policy) and expose potentially sensitive\ninformation. Kubernetes and crictl can both be configured to use\ncontainerd’s CRI implementation. (CVE-2022-23648)\n","modified":"2026-02-04T02:59:03.535933Z","published":"2022-03-06T10:40:17Z","related":["CVE-2022-23648"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0088.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30111"},{"type":"REPORT","url":"https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-5311-1"}],"affected":[{"package":{"name":"docker-containerd","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/docker-containerd?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.10-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0088.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}