Bug 1692755 (CVE-2019-0204)
Summary: | CVE-2019-0204 mesos: docker image code execution | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | chazlett, lloesche+fedora, negativo17 |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Apache Mesos 1.4.3, Apache Mesos 1.5.3, Apache Mesos 1.6.2, Apache Mesos 1.7.2, Apache Mesos 1.8.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-11-15 00:51:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1692756 | ||
Bug Blocks: | 1692758 |
Description
Dhananjay Arunesh
2019-03-26 11:26:13 UTC
Created mesos tracking bugs for this issue: Affects: fedora-all [bug 1692756] This issue has been addressed in the following products: Red Hat Fuse 7.5.0 Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-0204 |