Synopsis
The remote Amazon Linux 2 host is missing a security update.
Description
The version of docker installed on the remote host is prior to 25.0.14-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NITRO-ENCLAVES-2026-097 advisory.
Arithmetic over induction variables in loops were not correctly checked for underflow or overflow in the Go compiler (cmd/compile). As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption in programs compiled with affected Go versions. (CVE-2026-27143)
The Go compiler (cmd/compile) incorrectly handled no-op interface conversions, preventing correct determination about non-overlapping memory moves, potentially leading to memory corruption at runtime in programs compiled with affected Go versions. (CVE-2026-27144)
During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls. (CVE-2026-32280)
Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. (CVE-2026-32281)
On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root.
(CVE-2026-32282)
If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3. (CVE-2026-32283)
tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the old GNU sparse map format. (CVE-2026-32288)
Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content. This could cause actions within JS template literals to be incorrectly escaped, leading to XSS vulnerabilities. (CVE-2026-32289)
Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1. (CVE-2026-34040)
Tenable has extracted the preceding description block directly from the tested product security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Run 'yum update docker' or or 'yum update --advisory ALAS2NITRO-ENCLAVES-2026-097' to update your system.
Plugin Details
File Name: al2_ALASNITRO-ENCLAVES-2026-097.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:amazon:linux:docker-debuginfo, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:docker
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 4/30/2026
Vulnerability Publication Date: 3/27/2026