Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3627

Опубликовано: 18 мая 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

РелизСтатусПримечание
devel

not-affected

1.13.1-0ubuntu4
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1]]
esm-infra/xenial

not-affected

1.6.2~dfsg1-1ubuntu4
precise

DNE

precise/esm

DNE

trusty

released

1.6.2~dfsg1-1ubuntu4~14.04.1
trusty/esm

DNE

trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1]
upstream

released

1.6.1
utopic

ignored

end of life
vivid

ignored

end of life

Показывать по

EPSS

Процентиль: 35%
0.00141
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

nvd
около 10 лет назад

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

msrc
почти 4 года назад

Описание отсутствует

debian
около 10 лет назад

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor ...

github
больше 3 лет назад

Symlink Attack in Libcontainer and Docker Engine

EPSS

Процентиль: 35%
0.00141
Низкий

7.2 High

CVSS2