CVE-2015-3627 — Link Following in Docker Docker
Severity
7.2HIGHNVD
EPSS
0.1%
top 71.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 18
Latest updateAug 21
Description
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
CVSS vector
AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0
Affected Packages3 packages
🔴Vulnerability Details
6📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2015-3627 docker-io: docker: insecure opening of file-descriptor 1 leading to privilege escalation [epel-6]↗2015-05-08
Bugzilla▶
CVE-2015-3627 docker-io: docker: insecure opening of file-descriptor 1 leading to privilege escalation [fedora-all]↗2015-05-08
Bugzilla▶
CVE-2015-3627 docker: insecure opening of file-descriptor 1 leading to privilege escalation↗2015-05-06