First published: Wed Jun 01 2016(Updated: )
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/opencontainers/runc | <0.1.0 | 0.1.0 |
Docker | <=1.11.1 | |
runc | <=0.0.9 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3697 has a medium severity rating allowing local users to gain elevated privileges.
To remediate CVE-2016-3697, upgrade runC to version 0.1.0 or later and ensure Docker is updated to version 1.11.2 or later.
CVE-2016-3697 affects runC versions prior to 0.1.0 and Docker versions prior to 1.11.2.
CVE-2016-3697 cannot be exploited remotely as it requires local access to the vulnerable system.
CVE-2016-3697 can lead to unauthorized privilege escalation within containers, compromising their security.