What is this Vulnerability:
So as per the recent discovery by the maintainers of runc, the code of this service was having some bug which can be used by attackers to gain the root level of access of the host machine on which docker containers are running.
How it can be Exploited:
Solution to Fix Vulnerability:
- Update the docker version to latest version 18.09.2
- Update the docker version to latest version 18.06.1ce
Note: For AWS environment, you might need to disable /etc/yum/pluginconf.d/update-motd.conf file by changing it to Zero "0" from One "1" to view the available AWS package.
Along with package update , we should also consider deploying containers using some random users rather than root user as the vulnerability gets exploited when having “UID 0” i.e root privileges inside container.
So when you are using composer file to define images, make sure to define some unique users to run those containers and which also need to present on server on which this containers need to run.
Contact support@linuxforeveryone for any Freelancing work on Linux Servers
Subscribe my YouTube Channel
Like My Facebook Page
Browse the Best in class Web Hosting Plans