Vulnerability Description
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Docker | <= 1.11.1 |
| Linuxfoundation | Runc | <= 0.0.9 |
| Opensuse | Opensuse | 13.2 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1034.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2634.htmlThird Party Advisory
- https://github.com/docker/docker/issues/21436PatchThird Party Advisory
- https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aaThird Party Advisory
- https://github.com/opencontainers/runc/pull/708Third Party Advisory
- https://github.com/opencontainers/runc/releases/tag/v0.1.0PatchThird Party Advisory
- https://security.gentoo.org/glsa/201612-28Third Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1034.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2634.htmlThird Party Advisory
- https://github.com/docker/docker/issues/21436PatchThird Party Advisory
- https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aaThird Party Advisory
- https://github.com/opencontainers/runc/pull/708Third Party Advisory
- https://github.com/opencontainers/runc/releases/tag/v0.1.0PatchThird Party Advisory
FAQ
What is CVE-2016-3697?
CVE-2016-3697 is a vulnerability with a CVSS score of 7.8 (HIGH). libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric user...
How severe is CVE-2016-3697?
CVE-2016-3697 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3697?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Docker, Linuxfoundation Runc, Opensuse Opensuse.