{"id":"UBUNTU-CVE-2016-3697","details":"libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.","modified":"2025-07-16T07:49:39.837991Z","published":"2016-06-01T20:59:00Z","withdrawn":"2025-07-18T16:43:28Z","upstream":["CVE-2016-3697"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-3697"},{"type":"REPORT","url":"https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091"},{"type":"REPORT","url":"https://github.com/docker/docker/commit/da38ac6c79fe902ed0687afc73d731c95c6d491a"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-3697"}],"affected":[{"package":{"name":"runc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/runc@1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1"}]}],"versions":["0.0.8+dfsg-2","0.1.1-0ubuntu5~16.04","1.0.0~rc1-0ubuntu1~16.04","1.0.0~rc1-0ubuntu2~16.04.1","1.0.0~rc1-0ubuntu2~16.04.1.1","1.0.0~rc2-0ubuntu2~16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1","binary_name":"golang-github-opencontainers-runc-dev"},{"binary_version":"1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1","binary_name":"runc"},{"binary_version":"1.0.0~rc2+docker1.12.6-0ubuntu1~16.04.1","binary_name":"runc-dbgsym"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-3697.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}