CVE-2015-3629

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
Configurations

Configuration 1 (hide)

cpe:2.3:a:docker:libcontainer:1.6.0:*:*:*:*:docker:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2015/May/28 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2015/May/28 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/74558 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74558 - Broken Link, Third Party Advisory, VDB Entry
References () https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ - Permissions Required () https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ - Permissions Required

02 Feb 2024, 02:07

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html - (MISC) http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html - Third Party Advisory, VDB Entry
References () https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ - () https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ - Permissions Required
References (FULLDISC) http://seclists.org/fulldisclosure/2015/May/28 - (FULLDISC) http://seclists.org/fulldisclosure/2015/May/28 - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/74558 - (BID) http://www.securityfocus.com/bid/74558 - Broken Link, Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html - Mailing List, Third Party Advisory
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
First Time Opensuse
Opensuse opensuse
CPE cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

07 Nov 2023, 02:25

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'name': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ -

Information

Published : 2015-05-18 15:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3629

Mitre link : CVE-2015-3629

CVE.ORG link : CVE-2015-3629


JSON object : View

Products Affected

opensuse

  • opensuse

docker

  • libcontainer
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')