QID 353068
Date Published: 2021-12-14
QID 353068: Amazon Linux Security Advisory for docker : ALAS2DOCKER-2021-003
Docker engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go. (
( CVE-2018-20699) a command injection flaw was discovered in docker during the `docker build` command.
By providing a specially crafted path argument for the container to build, it is possible to inject command options to the `git fetch`/`git checkout` commands that are executed by docker and to execute code with the privileges of the user running docker.
A local attacker who can run `docker build` with a controlled build path, or a remote attacker who has control over the docker build path, could elevate their privileges or execute code. (
( CVE-2019-13139) in docker ce and ee before 18.09.8 (as well as docker ee before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), docker engine in debug mode may sometimes add secrets to the debug log.
This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets.
It potentially applies to other api users of the stack api if they resend the secret. (
( CVE-2019-13509)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2DOCKER-2021-003 -
alas.aws.amazon.com/AL2/ALASDOCKER-2021-003.html
CVEs related to QID 353068
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2DOCKER-2021-003 | Amazon Linux 2 |
|