github.com/opencontainers/runc is vulnerable to privilege escalation attacks. These attacks are possible because github.com/opencontainers/runc treats a numeric UID as a potential username. This allows local users to gain privileges though a numeric username in the password file. This transitively affects Docker.
CPE | Name | Operator | Version |
---|---|---|---|
docker | eq | 1.9.1__25.1.origin.el7 | |
docker | eq | 1.6.2__8.el7 |
lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
rhn.redhat.com/errata/RHSA-2016-1034.html
rhn.redhat.com/errata/RHSA-2016-2634.html
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1186066
bugzilla.redhat.com/show_bug.cgi?id=1261565
bugzilla.redhat.com/show_bug.cgi?id=1266307
bugzilla.redhat.com/show_bug.cgi?id=1268059
bugzilla.redhat.com/show_bug.cgi?id=1272143
bugzilla.redhat.com/show_bug.cgi?id=1303110
bugzilla.redhat.com/show_bug.cgi?id=1309739
bugzilla.redhat.com/show_bug.cgi?id=1316651
bugzilla.redhat.com/show_bug.cgi?id=1319783
bugzilla.redhat.com/show_bug.cgi?id=1322762
bugzilla.redhat.com/show_bug.cgi?id=1328219
bugzilla.redhat.com/show_bug.cgi?id=1329423
bugzilla.redhat.com/show_bug.cgi?id=1329743
bugzilla.redhat.com/show_bug.cgi?id=1330595
bugzilla.redhat.com/show_bug.cgi?id=1330622
bugzilla.redhat.com/show_bug.cgi?id=1331007
bugzilla.redhat.com/show_bug.cgi?id=1332592
github.com/docker/docker/issues/21436
github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
github.com/opencontainers/runc/pull/708
github.com/opencontainers/runc/releases/tag/v0.1.0
rhn.redhat.com/errata/RHSA-2016-1034.html
security.gentoo.org/glsa/201612-28