Amazon Linux AMI : docker (ALAS-2017-783)

medium Nessus Plugin ID 96394

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It was discovered that runC allowed additional container processes via `runc exec` to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file descriptors of these new processes during the initialization, which can lead to container escapes or modification of runC state before the process is fully placed inside the container.

Solution

Run 'yum update docker' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2017-783.html

Plugin Details

Severity: Medium

ID: 96394

File Name: ala_ALAS-2017-783.nasl

Version: 3.4

Type: local

Agent: unix

Published: 1/11/2017

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:docker, p-cpe:/a:amazon:linux:docker-pkg-devel, p-cpe:/a:amazon:linux:docker-debuginfo, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:docker-devel

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 1/10/2017

Reference Information

CVE: CVE-2016-9962

ALAS: 2017-783