ALAS2NITRO-ENCLAVES-2021-012

Related Vulnerabilities: CVE-2020-15257  

A flaw was found in containerd. Access controls for the shim's API socket verified that a connecting process had an effective UID of 0, but otherwise did not restrict access to the abstract Unix domain socket. This could allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-15257)

ALAS2NITRO-ENCLAVES-2021-012


Amazon Linux 2 Security Advisory: ALASNITRO-ENCLAVES-2021-012
Advisory Release Date: 2021-10-19 20:48 Pacific
Advisory Updated Date: 2021-11-18 21:40 Pacific
Severity: Medium
References: CVE-2020-15257 

Issue Overview:

A flaw was found in containerd. Access controls for the shim's API socket verified that a connecting process had an effective UID of 0, but otherwise did not restrict access to the abstract Unix domain socket. This could allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-15257)


Affected Packages:

containerd


Issue Correction:
Run yum update containerd to update your system.

New Packages:
aarch64:
    containerd-1.4.1-2.amzn2.aarch64
    containerd-stress-1.4.1-2.amzn2.aarch64
    containerd-debuginfo-1.4.1-2.amzn2.aarch64

src:
    containerd-1.4.1-2.amzn2.src

x86_64:
    containerd-1.4.1-2.amzn2.x86_64
    containerd-stress-1.4.1-2.amzn2.x86_64
    containerd-debuginfo-1.4.1-2.amzn2.x86_64