Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3629

Опубликовано: 18 мая 2015
Источник: debian
EPSS Низкий

Описание

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
docker.iofixed1.6.1+dfsg1-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2015/05/07/10

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

redhat
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 7.8
nvd
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 8.4
github
больше 3 лет назад

Arbitrary File Write in Libcontainer

oracle-oval
около 10 лет назад

ELSA-2015-3037: docker security update (IMPORTANT)

EPSS

Процентиль: 19%
0.0006
Низкий