Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3629

Опубликовано: 18 мая 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2
CVSS3: 7.8

Описание

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

РелизСтатусПримечание
devel

not-affected

1.13.1-0ubuntu4
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1]]
esm-infra/xenial

released

1.6.2~dfsg1-1ubuntu4
precise

DNE

precise/esm

DNE

trusty

released

1.6.2~dfsg1-1ubuntu4~14.04.1
trusty/esm

DNE

trusty was released [1.6.2~dfsg1-1ubuntu4~14.04.1]
upstream

released

1.6.1
utopic

ignored

end of life
vivid

ignored

end of life

Показывать по

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 7.8
nvd
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.

CVSS3: 7.8
debian
около 10 лет назад

Libcontainer 1.6.0, as used in Docker Engine, allows local users to es ...

CVSS3: 8.4
github
больше 3 лет назад

Arbitrary File Write in Libcontainer

oracle-oval
около 10 лет назад

ELSA-2015-3037: docker security update (IMPORTANT)

7.2 High

CVSS2

7.8 High

CVSS3