Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
Score CVSS v3.1
7.8
/ 10.0
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Informations
- Publié
- 18 mai 2015
- Mis à jour
- 12 avr. 2025
- Statut
- Deferred
- Source
- cve@mitre.org
Produits affectés
docker libcontainer
Versions : 1.6.0
opensuse opensuse
Versions : 13.2
Faiblesses (CWE)
CWE-59
Références (10)
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.htmlThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/May/28Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/74558Broken LinkThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.htmlThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/May/28Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/74558Broken LinkThird Party AdvisoryVDB Entry
CVEs similaires
Autres vulnérabilités de type CWE-59
Loading…
Surveillez vos produits
Recevez une alerte automatique à chaque nouvelle CVE affectant vos équipements.