ALASECS-2023-023

Related Vulnerabilities: CVE-2022-24769  

A flaw was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. Containers using Linux users and groups to perform privilege separation inside the container are most directly impacted. (CVE-2022-24769)

ALASECS-2023-023


Amazon Linux 2 Security Advisory: ALASECS-2023-023
Advisory Release Date: 2023-11-09 20:27 Pacific
Advisory Updated Date: 2023-11-15 23:19 Pacific
Severity: Medium

Issue Overview:

A flaw was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. Containers using Linux users and groups to perform privilege separation inside the container are most directly impacted. (CVE-2022-24769)


Affected Packages:

containerd

Note:

This advisory is applicable to Amazon Linux 2 - Ecs extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for difference between AL2 core and AL2 extras advisories.


Issue Correction:
Run yum update containerd to update your system.

New Packages:
aarch64:
    containerd-1.4.13-2.amzn2.0.1.aarch64
    containerd-stress-1.4.13-2.amzn2.0.1.aarch64
    containerd-debuginfo-1.4.13-2.amzn2.0.1.aarch64

src:
    containerd-1.4.13-2.amzn2.0.1.src

x86_64:
    containerd-1.4.13-2.amzn2.0.1.x86_64
    containerd-stress-1.4.13-2.amzn2.0.1.x86_64
    containerd-debuginfo-1.4.13-2.amzn2.0.1.x86_64