DKER-EE-002060 - The Docker Enterprise hosts UTS namespace must not be shared.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

UTS namespaces provide isolation of two system identifiers: the hostname and the NIS domain name. It is used for setting the hostname and the domain that is visible to running processes in that namespace. Processes running within containers do not typically require to know hostname and domain name. Hence, the namespace should not be shared with the host.

Sharing the UTS namespace with the host provides full permission to the container to change the hostname of the host. This must not be allowed.

By default, all containers have the UTS namespace enabled and host UTS namespace is not shared with any container.

Solution

This fix only applies to the use of Docker Engine - Enterprise on a Linux host operating system.

Do not start a container with --uts=host argument.

For example, do not start a container as below:

docker run --rm --interactive --tty --uts=host rhel7.2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-000381, Rule-ID|SV-235811r627560_rule, STIG-ID|DKER-EE-002060, STIG-Legacy|SV-104795, STIG-Legacy|V-95657, Vuln-ID|V-235811

Plugin: Unix

Control ID: 3644634c3b39c23af4b818f9096cadbda5eb5b14a974c37d4c03a209a5b5cac5