USN-4653-1: containerd vulnerability
30 November 2020
containerd could be made to crash or run programs as an administrator.
- containerd - daemon to control runC
It was discovered that access controls for the shim’s API socket did not
restrict access to the abstract unix domain socket in some cases. An attacker
could use this vulnerability to run containers with elevated privileges.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart containerd to make
all the necessary changes.
- USN-4653-2: containerd, golang-github-containerd-containerd-dev, golang-github-docker-containerd-dev