A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.

Published at
2019-03-25
1028 days ago
Modified
2019-11-14
794 days ago
2019
Year
The year of the turtle

http://www.securityfocus.com/bid/107605

BID:107605

https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E

MLIST:[mesos-dev] 20190323 CVE-2019-0204: Some Mesos components can be overwritten making arbitrary code execution possible.

https://access.redhat.com/errata/RHSA-2019:3892

REDHAT:RHSA-2019:3892

Vulnerability RAW

{
	"Title": {
		"_text": "CVE-2019-0204"
	},
	"Notes": {
		"Note": [
			{
				"_text": "A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host."
			},
			{
				"_text": "2019-03-25"
			},
			{
				"_text": "2019-11-14"
			}
		]
	},
	"CVE": {
		"_text": "CVE-2019-0204"
	},
	"References": {
		"Reference": [
			{
				"URL": {
					"_text": "http://www.securityfocus.com/bid/107605"
				},
				"Description": {
					"_text": "BID:107605"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[mesos-dev] 20190323 CVE-2019-0204: Some Mesos components can be overwritten making arbitrary code execution possible."
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:3892"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:3892"
				}
			}
		]
	}
}