Arbitrary File Write in Libcontainer
High severity
GitHub Reviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2024
Description
Published by the National Vulnerability Database
May 18, 2015
Reviewed
May 19, 2021
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Feb 2, 2024
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
References