CVE-2015-3629 — Link Following in Docker Docker
Severity
7.8HIGHNVD
EPSS
0.2%
top 60.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 18
Latest updateAug 21
Description
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
5📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2015-3629 docker-io: docker: symlink traversal on container respawn allows local privilege escalation [fedora-all]↗2015-05-08
Bugzilla▶
CVE-2015-3629 docker-io: docker: symlink traversal on container respawn allows local privilege escalation [epel-6]↗2015-05-08
Bugzilla▶
CVE-2015-3629 docker: symlink traversal on container respawn allows local privilege escalation↗2015-05-06