Search for packages
| purl | pkg:deb/debian/docker.io@1.6.1%2Bdfsg1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4mf3-mmz6-2kfs | Information Exposure in Docker Engine Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. |
CVE-2015-3630
GHSA-8fvr-5rqf-3wwh |
| VCID-6gxe-db4h-93ex | Symlink Attack in Libcontainer and Docker Engine Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image. |
CVE-2015-3627
GHSA-g7v2-2qxx-wjrw |
| VCID-ksbt-33eq-93c9 | Arbitrary File Write in Libcontainer Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container. |
CVE-2015-3629
GHSA-g44j-7vp3-68cv |
| VCID-nkhu-t2nh-s7b2 | Arbitrary File Override in Docker Engine Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. |
CVE-2015-3631
GHSA-v4h8-794j-g8mm |