ALAS2NITRO-ENCLAVES-2021-009


Amazon Linux 2 Security Advisory: ALASNITRO-ENCLAVES-2021-009
Advisory Release Date: 2021-10-19 20:41 Pacific
Advisory Updated Date: 2021-11-18 21:38 Pacific
Severity: Important

Issue Overview:

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. (CVE-2019-16884)

A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2019-19921)


Affected Packages:

runc


Note:

This advisory is applicable to Amazon Linux 2 - Nitro-enclaves Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update runc to update your system.

New Packages:
aarch64:
    runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.aarch64
    runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.amzn2.aarch64

src:
    runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.src

x86_64:
    runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.x86_64
    runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.amzn2.x86_64