This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2014-3499 docker: systemd socket activation results in privilege escalation
Product:
[Other] Security Response
Reporter:
Jon Stanley <jonstanley>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
high
Docs Contact:
Priority:
high
Version:
unspecified CC:
admiller, alexl, dwalsh, golang-updates, hushan.jia, jkeck, jon.stanley, jrusnack, lsm5, lsm5, mattdm, mgoldman, mjenner, security-response-team, sghosh, sparks, s, tjay, vbatts
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
Unspecified
OS:
Unspecified
Whiteboard:
Fixed In Version:
Doc Type:
Bug Fix
Doc Text:
Story Points:
---
Clone Of:
Environment:
Last Closed:
2014-07-01 04:42:20 UTC
Type:
Bug
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1111760 , 1111769 , 1114810 , 1114811 , 1114816
Bug Blocks:
1111739