Upstream information

CVE-2016-3697 at MITRE

Description

libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 2.11 5.10
Vector AV:L/AC:L/Au:N/C:P/I:N/A:N AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Local Network
Access Complexity Low High
Authentication None None
Confidentiality Impact Partial Partial
Integrity Impact None Partial
Availability Impact None Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.8
Vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Access Vector Local
Access Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
SUSE Bugzilla entry: 976777 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Containers 12
  • docker >= 1.10.3-66.1
Patchnames:
SUSE-SLE-Module-Containers-12-2016-682
SUSE OpenStack Cloud 6
  • docker >= 1.10.3-66.1
Patchnames:
SUSE-OpenStack-Cloud-6-2016-682
openSUSE 13.2
  • docker >= 1.9.1-56.1
  • docker-bash-completion >= 1.9.1-56.1
  • docker-debuginfo >= 1.9.1-56.1
  • docker-debugsource >= 1.9.1-56.1
  • docker-test >= 1.9.1-56.1
  • docker-zsh-completion >= 1.9.1-56.1
Patchnames:
openSUSE-2016-643
openSUSE Tumbleweed
  • docker >= 1.12.3-4.1
  • docker-bash-completion >= 1.12.3-4.1
  • docker-test >= 1.12.3-4.1
  • docker-zsh-completion >= 1.12.3-4.1
Patchnames:
openSUSE Tumbleweed GA docker