First published: Mon May 18 2015(Updated: )
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/docker/docker | <1.6.1 | 1.6.1 |
Docker | <=1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3631 has a high severity rating due to the potential for privilege escalation in Docker.
To fix CVE-2015-3631, update Docker Engine to version 1.6.1 or later.
Local users of Docker Engine versions prior to 1.6.1 are affected by CVE-2015-3631.
CVE-2015-3631 is a privilege escalation vulnerability that allows users to manipulate Linux Security Modules.
Docker Engine versions up to 1.6.0 are vulnerable to CVE-2015-3631.