libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
CVSS v3.1 Score
7.8
/ 10.0
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Information
- Published
- 1 juin 2016
- Updated
- 12 avr. 2025
- Status
- Deferred
- Source
- secalert@redhat.com
Affected products
docker dockerAll Docker CVEs →
Versions : 1.11.1
linuxfoundation runc
Versions : 0.0.9
opensuse opensuse
Versions : 13.2
Weaknesses (CWE)
CWE-264
References (16)
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1034.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2634.htmlThird Party Advisory
- https://github.com/docker/docker/issues/21436PatchThird Party Advisory
- https://github.com/opencontainers/runc/pull/708Third Party Advisory
- https://github.com/opencontainers/runc/releases/tag/v0.1.0PatchThird Party Advisory
- https://security.gentoo.org/glsa/201612-28Third Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1034.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2634.htmlThird Party Advisory
- https://github.com/docker/docker/issues/21436PatchThird Party Advisory
- https://github.com/opencontainers/runc/pull/708Third Party Advisory
- https://github.com/opencontainers/runc/releases/tag/v0.1.0PatchThird Party Advisory
- + 1 more references on NVD
Similar CVEs
Other vulnerabilities of type CWE-264
Loading…
Monitor your products
Get automatic alerts for every new CVE affecting your equipment.