github.com/opencontainers/runc is vulnerable to privilege escalation attacks. These attacks are possible because github.com/opencontainers/runc treats a numeric UID as a potential username. This allows local users to gain privileges though a numeric username in the password file. This transitively affects Docker.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/opencontainers/runc | eq | HEAD | |
github.com/opencontainers/runc | le | 0.0.9 |
lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
rhn.redhat.com/errata/RHSA-2016-1034.html
rhn.redhat.com/errata/RHSA-2016-2634.html
github.com/docker/docker/issues/21436
github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
github.com/opencontainers/runc/pull/708
github.com/opencontainers/runc/releases/tag/v0.1.0
security.gentoo.org/glsa/201612-28