CVE-2015-3631External Control of Critical State Data in Docker Docker

Severity
3.6LOWNVD
EPSS
0.1%
top 65.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 18
Latest updateAug 21

Description

Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.

CVSS vector

AV:L/AC:L/C:N/I:P/A:PExploitability: 3.9 | Impact: 4.9

Affected Packages2 packages

🔴Vulnerability Details

5
OSV
Arbitrary File Override in Docker Engine in github.com/docker/docker2024-08-21
OSV
Arbitrary File Override in Docker Engine2022-02-15
GHSA
Arbitrary File Override in Docker Engine2022-02-15
OSV
CVE-2015-3631: Docker Engine before 12015-05-18
CVEList
CVE-2015-3631: Docker Engine before 12015-05-18

📋Vendor Advisories

3
Microsoft
CVE-2015-3631: NIST NVD Details: https://nvd2021-07-13
Red Hat
docker: volume mounts allow LSM profile escalation2015-05-07
Debian
CVE-2015-3631: docker.io - Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Mo...2015

💬Community

3
Bugzilla
CVE-2015-3631 docker-io: docker: volume mounts allow LSM profile escalation [fedora-all]2015-05-08
Bugzilla
CVE-2015-3631 docker-io: docker: volume mounts allow LSM profile escalation [epel-6]2015-05-08
Bugzilla
CVE-2015-3631 docker: volume mounts allow LSM profile escalation2015-05-06
CVE-2015-3631 — External Control of Critical State Data | cvebase