CVE-2015-3627Link Following in Docker Docker

Severity
7.2HIGHNVD
EPSS
0.1%
top 71.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 18
Latest updateAug 21

Description

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages3 packages

🔴Vulnerability Details

6
OSV
Symlink Attack in Libcontainer and Docker Engine in github.com/docker/docker2024-08-21
GHSA
Symlink Attack in Libcontainer and Docker Engine2022-02-15
OSV
Symlink Attack in Libcontainer and Docker Engine2022-02-15
OSV
libxml2 vulnerabilities2016-06-06
OSV
CVE-2015-3627: Libcontainer and Docker Engine before 12015-05-18

📋Vendor Advisories

3
Microsoft
CVE-2015-3627: NIST NVD Details: https://nvd2021-07-13
Red Hat
docker: insecure opening of file-descriptor 1 leading to privilege escalation2015-05-07
Debian
CVE-2015-3627: docker.io - Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to ...2015

💬Community

3
Bugzilla
CVE-2015-3627 docker-io: docker: insecure opening of file-descriptor 1 leading to privilege escalation [epel-6]2015-05-08
Bugzilla
CVE-2015-3627 docker-io: docker: insecure opening of file-descriptor 1 leading to privilege escalation [fedora-all]2015-05-08
Bugzilla
CVE-2015-3627 docker: insecure opening of file-descriptor 1 leading to privilege escalation2015-05-06
CVE-2015-3627 — Link Following in Docker Docker | cvebase