Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 6 Jun 2022 12:45:34 -0700
From: Samuel Karp <>
Subject: CVE-2022-31030: containerd CRI plugin: Host memory exhaustion through ExecSync

A bug was found in containerd's CRI implementation where programs
inside a container can cause the containerd daemon to consume memory
without bound during invocation of the ExecSync API. This can cause
containerd to consume all available memory on the computer, denying
service to other legitimate workloads. Kubernetes and crictl can both
be configured to use containerd's CRI implementation; ExecSync may be
used when running probes or when executing processes via an "exec"

This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should
update to these versions to resolve the issue.

Ensure that only trusted images and commands are used.

Similar fix in cri-o's CRI implementation GHSA-fcm2-6c3h-pg6j [1]

The containerd project would like to thank David Korczynski and Adam
Korczynski of ADA Logics for responsibly disclosing this issue in
accordance with the containerd security policy [2] during a security
audit sponsored by CNCF and facilitated by OSTIF.

For more information
If you have any questions or comments about this advisory:
* Open an issue in our GitHub repository [3]
* Email us at

On behalf of the containerd project,
Samuel Karp


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.