Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-4653-2: containerd vulnerability

Back to Search

Ubuntu: USN-4653-2: containerd vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/13/2021
Created
01/15/2021
Added
01/14/2021
Modified
01/14/2021

Description

containerd packages from USN-4653-1 were reverted in order to fix a dependency issue with the docker package. This new update fixes the same issues as the previous one. We apologize for the inconvenience.

Original advisory details:

It was discovered that access controls for the shim’s API socket did not restrict access to the abstract unix domain socket in some cases. An attacker could use this vulnerability to run containers with elevated privileges.

Solution(s)

  • ubuntu-upgrade-containerd
  • ubuntu-upgrade-golang-github-containerd-containerd-dev
  • ubuntu-upgrade-golang-github-docker-containerd-dev

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;