VYPR
High severityNVD Advisory· Published May 18, 2015· Updated May 6, 2026

CVE-2015-3630

CVE-2015-3630

Description

Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/docker/dockerGo
>= 1.6.0, < 1.6.11.6.1

Affected products

1
  • cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
    Range: <=1.6

Patches

1
545b440a80f6

Mount /proc/fs as readonly

https://github.com/moby/mobyMichael CrosbyApr 20, 2015via ghsa
1 file changed · +1 0
  • daemon/execdriver/native/template/default_template.go+1 0 modified
    @@ -86,6 +86,7 @@ func New() *configs.Config {
     		ReadonlyPaths: []string{
     			"/proc/asound",
     			"/proc/bus",
    +			"/proc/fs",
     			"/proc/irq",
     			"/proc/sys",
     			"/proc/sysrq-trigger",
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

14

News mentions

0

No linked articles in our index yet.