CVE-2020-15257Incorrect Resource Transfer Between Spheres in Containerd

Severity
5.2MEDIUMNVD
EPSS
11.1%
top 6.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 1
Latest updateAug 21

Description

containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 2.0 | Impact: 2.7

Affected Packages4 packages

NVDlinuxfoundation/containerd1.4.01.4.3+1
CVEListV5containerd/containerd< 1.3.9+1
Gogithub.com/containerd_containerd1.4.01.4.3+1
Debiancontainerd/containerd< 1.4.3~ds1-1+3

Also affects: Debian Linux 10.0, Fedora 33

Patches

🔴Vulnerability Details

5
OSV
containerd-shim API Exposed to Host Network Containers in github.com/containerd/containerd2024-08-21
GHSA
containerd-shim API Exposed to Host Network Containers2021-05-24
OSV
containerd-shim API Exposed to Host Network Containers2021-05-24
OSV
CVE-2020-15257: containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows2020-12-01
CVEList
containerd-shim API Exposed to Host Network Containers2020-12-01

📋Vendor Advisories

4
Ubuntu
containerd vulnerability2021-01-13
Red Hat
containerd: unrestricted access to abstract Unix domain socket can lead to privileges escalation2020-11-30
Ubuntu
containerd vulnerability2020-11-30
Debian
CVE-2020-15257: containerd - containerd is an industry-standard container runtime and is available as a daemo...2020
CVE-2020-15257 — Containerd vulnerability | cvebase