First published: Sat Jan 12 2019(Updated: )
Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Engine | <18.09 | |
Redhat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20699 is a vulnerability in Docker Engine that allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value.
CVE-2018-20699 has a severity rating of 4.9, which is considered medium.
CVE-2018-20699 can be exploited by providing a large integer in the --cpuset-mems or --cpuset-cpus value.
Yes, Docker Engine version 18.09 is affected by CVE-2018-20699.
To fix CVE-2018-20699, upgrade to a version of Docker Engine that is not affected by the vulnerability.