USN-4653-2: containerd vulnerability
13 January 2021
containerd could be made to crash or run programs as an administrator.
- containerd - daemon to control runC
containerd packages from USN-4653-1 were reverted in order to fix a dependency
issue with the docker package. This new update fixes the same issues as the
previous one. We apologize for the inconvenience.
Original advisory details:
It was discovered that access controls for the shim’s API socket did not
restrict access to the abstract unix domain socket in some cases. An attacker
could use this vulnerability to run containers with elevated privileges.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to restart containerd to make
all the necessary changes.