CVE-2015-3629

Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
Configurations

Configuration 1 (hide)

cpe:2.3:a:docker:libcontainer:1.6.0:*:*:*:*:docker:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

02 Feb 2024, 02:07

Type Values Removed Values Added
CPE cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:a:docker:libcontainer:1.6.0:*:*:*:*:docker:*:*

Information

Published : 2015-05-18 15:59

Updated : 2024-02-02 02:07


NVD link : CVE-2015-3629

Mitre link : CVE-2015-3629

CVE.ORG link : CVE-2015-3629


JSON object : View

Products Affected

opensuse

  • opensuse

docker

  • libcontainer
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')