Privilege Escalation via Symlink Attack in Docker Engine

Privilege Escalation via Symlink Attack in Docker Engine

CVE-2015-3627 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.

Learn more about our Cis Benchmark Audit For Docker.