VULNERABILITY

Oracle Linux: CVE-2016-9962: ELSA-2017-3511: docker-engine docker-engine-selinux security and bugfix update (IMPORTANT) (Multiple Advisories)

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Oracle Linux: CVE-2016-9962: ELSA-2017-3511: docker-engine docker-engine-selinux security and bugfix update (IMPORTANT) (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:H/Au:M/C:C/I:C/A:C)
Published
01/11/2017
Created
07/25/2018
Added
01/14/2017
Modified
11/29/2024

Description

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. The runc component used by `docker exec` feature of docker allowed additional container processes to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.

Solution(s)

  • oracle-linux-upgrade-docker-engine
  • oracle-linux-upgrade-docker-engine-selinux

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;