Vulnerability Description
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Docker | <= 1.6 |
| Docker | Libcontainer | <= 1.6.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Informat
- http://seclists.org/fulldisclosure/2015/May/28
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZr
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Informat
- http://seclists.org/fulldisclosure/2015/May/28
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZr
FAQ
What is CVE-2015-3627?
CVE-2015-3627 is a vulnerability with a CVSS score of 7.2 (HIGH). Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an i...
How severe is CVE-2015-3627?
CVE-2015-3627 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3627?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Docker, Docker Libcontainer.