CVE-2015-3629

high

Description

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

References

https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ

http://seclists.org/fulldisclosure/2015/May/28

http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html

http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html

Details

Source: Mitre, NVD

Published: 2015-05-18

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High