Package "containerd"
Name: |
containerd
|
Description: |
daemon to control runC
|
Latest version: |
1.6.12-0ubuntu1~22.04.3 |
Release: |
jammy (22.04) |
Level: |
security |
Repository: |
main |
Homepage: |
https://containerd.io |
Links
Download "containerd"
Other versions of "containerd" in Jammy
Changelog
containerd (1.6.12-0ubuntu1~22.04.3) jammy-security; urgency=medium
* SECURITY UPDATE: Denial of service through image processing
- debian/patches/CVE-2023-25153.patch: limit the amount of
bytes read to 20Mb in images/archive/importer.go.
- CVE-2023-25153
* SECURITY UPDATE: Incorrect supplementary group access control
- debian/patches/CVE-2023-25173.patch: ensure that primary GID
is included in the list of additionals GIDs in oci/spec_opts.go.
- CVE-2023-25173
* d/p/skip-test-setting-OOM-score-to-negative-number-in-unprivileged-mode.patch:
fix a FTBFS in Ubuntu builders only.
-- David Fernandez Gonzalez <email address hidden> Tue, 04 Jul 2023 09:37:55 +0200
|
Source diff to previous version |
CVE-2023-25153 |
containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of b |
CVE-2023-25173 |
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not |
|
containerd (1.5.9-0ubuntu3.1) jammy-security; urgency=medium
* SECURITY UPDATE: Memory exhaustion through Exec
- debian/patches/CVE-2022-23471.patch: Prevent goroutine leak in Exec
in pkg/cri/streaming/remotecommand/httpstream.go.
- CVE-2022-23471
* SECURITY UPDATE: Privilege escalation by inheritable file capabilities.
- debian/patches/CVE-2022-24769.patch: Unassign the Inheritable
capability in oci/spec.go and oci/spec_opts.go.
- CVE-2022-24769
* SECURITY UPDATE: Improper access to images due to imgcrypt.
- debian/patches/CVE-2022-24778.patch: perform proper
authentication by adding platforms in
vendor/github.com/containerd/imgcrypt/images/
encryption/encryption.go.
- CVE-2022-24778
* SECURITY UPDATE: Memory exhaustion through ExecSync.
- debian/patches/CVE-2022-31030.patch: limit the response size
of ExecSync in pkg/cri/server/container_execsync.go.
- CVE-2022-31030
-- David Fernandez Gonzalez <email address hidden> Mon, 12 Dec 2022 11:31:33 +0100
|
CVE-2022-23471 |
containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In th |
CVE-2022-24769 |
Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to |
CVE-2022-24778 |
The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for |
CVE-2022-31030 |
containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause th |
|
About
-
Send Feedback to @ubuntu_updates