Bug 1111687 (CVE-2014-3499) - CVE-2014-3499 docker: systemd socket activation results in privilege escalation
Summary: CVE-2014-3499 docker: systemd socket activation results in privilege escalation
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-3499
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1111760 1111769 1114810 1114811 1114816
Blocks: 1111739
TreeView+ depends on / blocked
 
Reported: 2014-06-20 17:58 UTC by Jon Stanley
Modified: 2023-05-13 01:57 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-07-01 04:42:20 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0820 0 normal SHIPPED_LIVE Important: docker security update 2014-07-01 08:04:13 UTC

Comment 30 Trevor Jay 2014-07-01 02:40:56 UTC
It was found that the socket used to manage the Docker service was world readable and writable. A local user could use this flaw to escalate their privileges to root.

Acknowledgements:

Red Hat would like to thank Jon Stanley for reporting this issue.

Comment 31 Trevor Jay 2014-07-01 02:44:49 UTC
This flaw also affects all Fedora 19 and 20 docker-io packages up to and including 1.0.0-4.

Comment 33 errata-xmlrpc 2014-07-01 04:05:06 UTC
This issue has been addressed in following products:

  RHEL Extras for RHEL-7

Via RHSA-2014:0820 https://rhn.redhat.com/errata/RHSA-2014-0820.html

Comment 34 Trevor Jay 2014-07-01 04:40:24 UTC
Created docker-io tracking bugs for this issue:

Affects: fedora-all [bug 1114810]
Affects: epel-6 [bug 1114811]

Comment 35 Trevor Jay 2014-07-01 05:41:02 UTC
Created docker-io tracking bugs for this issue:

Affects: epel-7 [bug 1114816]


Note You need to log in before you can comment on or make changes to this bug.