7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
github.com/opencontainers/runc is vulnerable to privilege escalation attacks. These attacks are possible because github.com/opencontainers/runc treats a numeric UID as a potential username. This allows local users to gain privileges though a numeric username in the password file. This transitively affects Docker.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/opencontainers/runc | eq | HEAD | |
github.com/opencontainers/runc | le | 0.0.9 |
lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
rhn.redhat.com/errata/RHSA-2016-1034.html
rhn.redhat.com/errata/RHSA-2016-2634.html
github.com/docker/docker/issues/21436
github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
github.com/opencontainers/runc/pull/708
github.com/opencontainers/runc/releases/tag/v0.1.0
security.gentoo.org/glsa/201612-28
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N