Amazon Linux 2 Security Advisory: ALASNITRO-ENCLAVES-2021-009
Advisory Release Date: 2021-10-19 20:41 Pacific
Advisory Updated Date: 2021-11-18 21:38 Pacific
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. (CVE-2019-16884)
A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2019-19921)
Affected Packages:
runc
Note:
This advisory is applicable to Amazon Linux 2 - Nitro-enclaves Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update runc to update your system.
aarch64:
runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.aarch64
runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.amzn2.aarch64
src:
runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.src
x86_64:
runc-1.0.0-0.1.20200204.gitdc9208a.amzn2.x86_64
runc-debuginfo-1.0.0-0.1.20200204.gitdc9208a.amzn2.x86_64