Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3629

Опубликовано: 07 мая 2015
Источник: redhat
CVSS2: 4.3

Описание

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1219058docker: symlink traversal on container respawn allows local privilege escalation

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 7.8
nvd
больше 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 7.8
debian
больше 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to es ...

CVSS3: 8.4
github
больше 3 лет назад

Arbitrary File Write in Libcontainer

oracle-oval
больше 10 лет назад

ELSA-2015-3037: docker security update (IMPORTANT)

4.3 Medium

CVSS2