ALT-PU-2016-1486-1
Closed vulnerabilities
Published: 2016-06-01
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-3697
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
Severity: LOW (2.1)
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Severity: HIGH (7.8)
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-1034.html
- http://rhn.redhat.com/errata/RHSA-2016-2634.html
- https://github.com/docker/docker/issues/21436
- https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
- https://github.com/opencontainers/runc/pull/708
- https://github.com/opencontainers/runc/releases/tag/v0.1.0
- https://security.gentoo.org/glsa/201612-28
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-1034.html
- http://rhn.redhat.com/errata/RHSA-2016-2634.html
- https://github.com/docker/docker/issues/21436
- https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
- https://github.com/opencontainers/runc/pull/708
- https://github.com/opencontainers/runc/releases/tag/v0.1.0
- https://security.gentoo.org/glsa/201612-28