From e748ba9741f6540f4675c23e3e37b73e822c13a4 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 31 May 2021 20:59:14 +0100 Subject: gentoo resync : 31.05.2021 --- metadata/glsa/glsa-202105-33.xml | 55 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 metadata/glsa/glsa-202105-33.xml (limited to 'metadata/glsa/glsa-202105-33.xml') diff --git a/metadata/glsa/glsa-202105-33.xml b/metadata/glsa/glsa-202105-33.xml new file mode 100644 index 000000000000..dddf99d66910 --- /dev/null +++ b/metadata/glsa/glsa-202105-33.xml @@ -0,0 +1,55 @@ + + + + containerd: Multiple vulnerabilities + Multiple vulnerabilities have been found in containerd, the worst + of which could result in privilege escalation. + + containerd + 2021-05-26 + 2021-05-26 + 758137 + 775329 + local + + + 1.4.4 + 1.4.4 + + + +

Containerd is a daemon with an API and a command line client, to manage + containers on one machine. It uses runC to run containers according to + the OCI specification. +

+
+ +

Multiple vulnerabilities have been discovered in containerd. Please + review the CVE identifiers referenced below for details. +

+
+ +

A local attacker, able to run a malicious container in the same network + namespace as the shim, could possibly escalate privileges. Furthermore, + an attacker could disclose sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All containerd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/containerd-1.4.4" + + +
+ + CVE-2020-15257 + CVE-2021-21334 + + whissi + whissi +
-- cgit v1.2.3