Privilege Elevation Affecting github.com/opencontainers/runc/libcontainer/user package, versions <0.1.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCLIBCONTAINERUSER-50037
  • published24 Mar 2016
  • disclosed24 Mar 2016
  • creditUnknown

Introduced: 24 Mar 2016

CVE-2016-3697  (opens in a new tab)
CWE-264  (opens in a new tab)

Overview

Affected version of github.com/opencontainers/runc/libcontainer/user are vulnerable to Privilege Elevation. libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.

CVSS Scores

version 3.1