{"id":"CVE-2016-3697","details":"libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.","aliases":["GHSA-q3j5-32m5-58c2","GO-2021-0070"],"modified":"2026-04-16T06:19:54.200345254Z","published":"2016-06-01T20:59:06.137Z","related":["CGA-93mr-rgfh-pxq2","SUSE-SU-2016:1159-1","SUSE-SU-2025:03540-1","SUSE-SU-2025:03545-1","openSUSE-SU-2024:10532-1","openSUSE-SU-2025:15589-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1034.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2634.html"},{"type":"ADVISORY","url":"https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091"},{"type":"ADVISORY","url":"https://github.com/opencontainers/runc/pull/708"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-28"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html"},{"type":"FIX","url":"https://github.com/docker/docker/issues/21436"},{"type":"FIX","url":"https://github.com/opencontainers/runc/releases/tag/v0.1.0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/docker/docker","events":[{"introduced":"0"},{"last_affected":"5604cbed50d51c4039b1abcb1cf87c4e01bce924"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.11.1"}]}},{"type":"GIT","repo":"https://github.com/opencontainers/runc","events":[{"introduced":"0"},{"last_affected":"94dc520a5732126985fec249f80c91b9e0601815"},{"fixed":"69af385de62ea68e2e608335cffbb0f4aa3db091"},{"fixed":"8e129e097220b2591edd59957c4ff08e064e14b9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.0.9"}]}}],"versions":["0.0.3","upstream/0.1.2","upstream/0.1.3","v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.2.0","v0.2.1","v0.2.2","v0.3.0","v0.3.1","v0.3.2","v0.4.1","v0.4.2","v0.4.4","v0.4.5","v0.4.7","v0.5.0","v0.6.5","v0.7.0","v0.7.1","v0.7.2","v1.11.0","v1.11.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"13.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3697.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}