Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-containers/runc@1.1.12
Typeebuild
Namespaceapp-containers
Namerunc
Version1.1.12
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3m4n-58pj-mkeb
vulnerability_id VCID-3m4n-58pj-mkeb
summary Multiple vulnerabilities have been discovered in runc, the worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29162.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29162
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31945
published_at 2026-04-13T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.31979
published_at 2026-04-16T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32074
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.31931
published_at 2026-04-21T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-18T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32018
published_at 2026-04-11T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32015
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.31986
published_at 2026-04-08T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-07T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32114
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5
5
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/releases/tag/v1.1.2
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66
7
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29162
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29162
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2086398
reference_id 2086398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2086398
13
reference_url https://security.archlinux.org/AVG-2707
reference_id AVG-2707
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2707
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/
reference_id AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/
reference_id D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/
16
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/
reference_id GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/
18
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
19
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
20
reference_url https://access.redhat.com/errata/RHSA-2022:7469
reference_id RHSA-2022:7469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7469
21
reference_url https://access.redhat.com/errata/RHSA-2022:8090
reference_id RHSA-2022:8090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8090
22
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2022-29162, GHSA-f3fp-gc8g-vw66
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4n-58pj-mkeb
1
url VCID-3yvf-q4uj-dbdh
vulnerability_id VCID-3yvf-q4uj-dbdh
summary
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC
### Impact

In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration.

This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces.

Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter.

However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios.

The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date.

### Patches
The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed.

### Workarounds
To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.

### References
* commit d72d057ba794 ("runc init: avoid netlink message length overflows")
* https://bugs.chromium.org/p/project-zero/issues/detail?id=2241

### Credits
Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive.

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/opencontainers/runc)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43784.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43784
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30027
published_at 2026-04-21T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30072
published_at 2026-04-18T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-16T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30078
published_at 2026-04-13T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30175
published_at 2026-04-01T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30128
published_at 2026-04-12T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30171
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30168
published_at 2026-04-09T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30132
published_at 2026-04-08T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30073
published_at 2026-04-07T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30255
published_at 2026-04-04T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30206
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43784
2
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
6
reference_url https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
7
reference_url https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77
8
reference_url https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
9
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
10
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-43784
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-43784
13
reference_url https://pkg.go.dev/vuln/GO-2022-0274
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0274
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2029439
reference_id 2029439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2029439
15
reference_url https://security.archlinux.org/AVG-2599
reference_id AVG-2599
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2599
16
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
17
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
18
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2021-43784, GHSA-v95c-p5hm-xq8f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yvf-q4uj-dbdh
2
url VCID-jc1e-8tt4-xqdn
vulnerability_id VCID-jc1e-8tt4-xqdn
summary
Opencontainers runc Incorrect Authorization vulnerability
runc 1.0.0-rc95 through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to `libcontainer/rootfs_linux.go`. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27561.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27561
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35018
published_at 2026-04-21T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35064
published_at 2026-04-18T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35099
published_at 2026-04-11T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35069
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35118
published_at 2026-04-02T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35147
published_at 2026-04-04T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35025
published_at 2026-04-07T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35079
published_at 2026-04-16T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35065
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
5
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
6
reference_url https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
7
reference_url https://github.com/opencontainers/runc/issues/3751
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://github.com/opencontainers/runc/issues/3751
8
reference_url https://github.com/opencontainers/runc/pull/3785
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/3785
9
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases/tag/v1.1.5
10
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27561
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-27561
22
reference_url https://security.netapp.com/advisory/ntap-20241206-0004
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241206-0004
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033520
reference_id 1033520
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033520
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175721
reference_id 2175721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175721
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/
reference_id ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/
reference_id DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/
reference_id FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/
reference_id FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/
29
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/
reference_id I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/
31
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
32
reference_url https://access.redhat.com/errata/RHSA-2023:3612
reference_id RHSA-2023:3612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3612
33
reference_url https://access.redhat.com/errata/RHSA-2023:5006
reference_id RHSA-2023:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5006
34
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
35
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
36
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
37
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
38
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2023-27561, GHSA-vpvm-3wq2-2wvm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc1e-8tt4-xqdn
3
url VCID-seds-dzew-jyfs
vulnerability_id VCID-seds-dzew-jyfs
summary
runc AppArmor bypass with symlinked /proc
### Impact
It was found that AppArmor, and potentially SELinux, can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration.

### Patches
Fixed in runc v1.1.5, by prohibiting symlinked `/proc`: https://github.com/opencontainers/runc/pull/3785

This PR fixes CVE-2023-27561 as well.

### Workarounds
Avoid using an untrusted container image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28642.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28642
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01328
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01825
published_at 2026-04-21T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01755
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01759
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01767
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01752
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0175
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01739
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.0174
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/pull/3785
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:47Z/
url https://github.com/opencontainers/runc/pull/3785
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:47Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-28642
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-28642
8
reference_url https://security.netapp.com/advisory/ntap-20241206-0005
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241206-0005
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182883
reference_id 2182883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182883
10
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
11
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
12
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
13
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
14
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
15
reference_url https://access.redhat.com/errata/RHSA-2024:0564
reference_id RHSA-2024:0564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0564
16
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
17
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2023-28642, GHSA-g2j6-57v7-gm8c
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-seds-dzew-jyfs
4
url VCID-tsgr-5mwt-jkeh
vulnerability_id VCID-tsgr-5mwt-jkeh
summary
runc vulnerable to container breakout through process.cwd trickery and leaked fds
### Impact

In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from `runc exec`) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through `runc run` ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b").

Strictly speaking, while attack 3a is the most severe from a CVSS perspective, attacks 2 and 3b are arguably more dangerous in practice because they allow for a breakout from inside a container as opposed to requiring a user execute a malicious image. The reason attacks 1 and 3a are scored higher is because being able to socially engineer users is treated as a given for UI:R vectors, despite attacks 2 and 3b requiring far more minimal user interaction (just reasonable `runc exec` operations on a container the attacker has access to). In any case, all four attacks can lead to full control of the host system.

#### Attack 1: `process.cwd` "mis-configuration"

In runc 1.1.11 and earlier, several file descriptors were inadvertently leaked internally within runc into `runc init`, including a handle to the host's `/sys/fs/cgroup` (this leak was added in v1.0.0-rc93). If the container was configured to have `process.cwd` set to `/proc/self/fd/7/` (the actual fd can change depending on file opening order in `runc`), the resulting pid1 process will have a working directory in the host mount namespace and thus the spawned process can access the entire host filesystem. This alone is not an exploit against runc, however a malicious image could make any innocuous-looking non-`/` path a symlink to `/proc/self/fd/7/` and thus trick a user into starting a container whose binary has access to the host filesystem.

Furthermore, prior to runc 1.1.12, runc also did not verify that the final working directory was inside the container's mount namespace after calling `chdir(2)` (as we have already joined the container namespace, it was incorrectly assumed there would be no way to chdir outside the container after `pivot_root(2)`).

The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N (8.2, high severity).

Note that this attack requires a privileged user to be tricked into running a malicious container image. It should be noted that when using higher-level runtimes (such as Docker or Kubernetes), this exploit can be considered critical as it can be done remotely by anyone with the rights to start a container image (and can be exploited from within Dockerfiles using `ONBUILD` in the case of Docker).

#### Attack 2: `runc exec` container breakout

(This is a modification of attack 1, constructed to allow for a process inside a container to break out.)

The same fd leak and lack of verification of the working directory in attack 1 also apply to `runc exec`. If a malicious process inside the container knows that some administrative process will call `runc exec` with the `--cwd` argument and a given path, in most cases they can replace that path with a symlink to `/proc/self/fd/7/`. Once the container process has executed the container binary, `PR_SET_DUMPABLE` protections no longer apply and the attacker can open `/proc/$exec_pid/cwd` to get access to the host filesystem.

`runc exec` defaults to a cwd of `/` (which cannot be replaced with a symlink), so this attack depends on the attacker getting a user (or some administrative process) to use `--cwd` and figuring out what path the target working directory is. Note that if the target working directory is a parent of the program binary being executed, the attacker might be unable to replace the path with a symlink (the `execve` will fail in most cases, unless the host filesystem layout specifically matches the container layout in specific ways and the attacker knows which binary the `runc exec` is executing).

The CVSS score for this attack is CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N (7.2, high severity).

#### Attacks 3a and 3b: `process.args` host binary overwrite attack

(These are modifications of attacks 1 and 2, constructed to overwrite a host binary by using `execve` to bring a magic-link reference into the container.)

Attacks 1 and 2 can be adapted to overwrite a host binary by using a path like `/proc/self/fd/7/../../../bin/bash` as the `process.args` binary argument, causing a host binary to be executed by a container process. The `/proc/$pid/exe` handle can then be used to overwrite the host binary, as seen in CVE-2019-5736 (note that the same `#!` trick can be used to avoid detection as an attacker). As the overwritten binary could be something like `/bin/bash`, as soon as a privileged user executes the target binary on the host, the attacker can pivot to gain full access to the host.

For the purposes of CVSS scoring:

* Attack 3a is attack 1 but adapted to overwrite a host binary, where a malicious image is set up to execute `/proc/self/fd/7/../../../bin/bash` and run a shell script that overwrites `/proc/self/exe`, overwriting the host copy of `/bin/bash`. The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H (8.6, high severity).
* Attack 3b is attack 2 but adapted to overwrite a host binary, where the malicious container process overwrites all of the possible `runc exec` target binaries inside the container (such as `/bin/bash`) such that a host target binary is executed and then the container process opens `/proc/$pid/exe` to get access to the host binary and overwrite it. The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H (8.2, high severity).

As mentioned in attack 1, while 3b is scored lower it is more dangerous in practice as it doesn't require a user to run a malicious image.

### Patches
runc 1.1.12 has been released, and includes patches for this issue. Note that there are four separate fixes applied:

* Checking that the working directory is actually inside the container by checking whether `os.Getwd` returns `ENOENT` (Linux provides a way of detecting if cwd is outside the current namespace root). This explicitly blocks runc from executing a container process when inside a non-container path and thus eliminates attacks 1 and 2 even in the case of fd leaks.
* Close all internal runc file descriptors in the final stage of `runc init`, right before `execve`. This ensures that internal file descriptors cannot be used as an argument to `execve` and thus eliminates attacks 3a and 3b, even in the case of fd leaks. This requires hooking into some Go runtime internals to make sure we don't close critical Go internal file descriptors.
* Fixing the specific fd leaks that made these bug exploitable (mark `/sys/fs/cgroup` as `O_CLOEXEC` and backport a fix for some `*os.File` leaks).
* In order to protect against future `runc init` file descriptor leaks, mark all non-stdio files as `O_CLOEXEC` before executing `runc init`.

### Other Runtimes

We have discovered that several other container runtimes are either potentially vulnerable to similar attacks, or do not have sufficient protection against attacks of this nature. We recommend other container runtime authors look at [our patches](#Patches) and make sure they at least add a `getcwd() != ENOENT` check as well as consider whether `close_range(3, UINT_MAX, CLOSE_RANGE_CLOEXEC)` before executing their equivalent of `runc init` is appropriate.

 * crun 1.12 does not leak any useful file descriptors into the `runc init`-equivalent process (so this attack is _not exploitable_ as far as we can tell), but no care is taken to make sure all non-stdio files are `O_CLOEXEC` and there is no check after `chdir(2)` to ensure the working directory is inside the container. If a file descriptor happened to be leaked in the future, this could be exploitable. In addition, any file descriptors passed to `crun` are not closed until the container process is executed, meaning that easily-overlooked programming errors by users of `crun` can lead to these attacks becoming exploitable.
 * youki 0.3.1 does not leak any useful file descriptors into the `runc init`-equivalent process (so this attack is _not exploitable_ as far as we can tell) however this appears to be pure luck. `youki` does leak a directory file descriptor from the host mount namespace, but it just so happens that the directory is the rootfs of the container (which then gets `pivot_root`'d into and so ends up as a in-root path thanks to `chroot_fs_refs`). In addition, no care is taken to make sure all non-stdio files are `O_CLOEXEC` and there is no check after `chdir(2)` to ensure the working directory is inside the container. If a file descriptor happened to be leaked in the future, this could be exploitable. In addition, any file descriptors passed to `youki` are not closed until the container process is executed, meaning that easily-overlooked programming errors by users of `youki` can lead to these attacks becoming exploitable.
 * LXC 5.0.3 does not appear to leak any useful file descriptors, and they have comments noting the importance of not leaking file descriptors in `lxc-attach`. However, they don't seem to have any proactive protection against file descriptor leaks at the point of `chdir` such as using `close_range(...)` (they do have RAII-like `__do_fclose` closers but those don't necessarily stop all leaks in this context) nor do they have any check after `chdir(2)` to ensure the working directory is inside the container. Unfortunately it seems they cannot use `CLOSE_RANGE_CLOEXEC` because they don't need to re-exec themselves.

### Workarounds
For attacks 1 and 2, only permit containers (and `runc exec`) to use a `process.cwd` of `/`. It is not possible for `/` to be replaced with a symlink (the path is resolved from within the container's mount namespace, and you cannot change the root of a mount namespace or an fs root to a symlink).

For attacks 1 and 3a, only permit users to run trusted images.

For attack 3b, there is no practical workaround other than never using `runc exec` because any binary you try to execute with `runc exec` could end up being a malicious binary target.

### See Also
* https://www.cve.org/CVERecord?id=CVE-2024-21626
* https://github.com/opencontainers/runc/releases/tag/v1.1.12
* The runc 1.1.12 merge commit https://github.com/opencontainers/runc/commit/a9833ff391a71b30069a6c3f816db113379a4346, which contains the following security patches:
  * https://github.com/opencontainers/runc/commit/506552a88bd3455e80a9b3829568e94ec0160309
  * https://github.com/opencontainers/runc/commit/0994249a5ec4e363bfcf9af58a87a722e9a3a31b
  * https://github.com/opencontainers/runc/commit/fbe3eed1e568a376f371d2ced1b4ac16b7d7adde
  * https://github.com/opencontainers/runc/commit/284ba3057e428f8d6c7afcc3b0ac752e525957df
  * https://github.com/opencontainers/runc/commit/b6633f48a8c970433737b9be5bfe4f25d58a5aa7
  * https://github.com/opencontainers/runc/commit/683ad2ff3b01fb142ece7a8b3829de17150cf688
  * https://github.com/opencontainers/runc/commit/e9665f4d606b64bf9c4652ab2510da368bfbd951

### Credits

Thanks to Rory McNamara from Snyk for discovering and disclosing the original vulnerability (attack 1) to Docker, @lifubang from acmcoder for discovering how to adapt the attack to overwrite host binaries (attack 3a), and Aleksa Sarai from SUSE for discovering how to adapt the attacks to work as container breakouts using `runc exec` (attacks 2 and 3b).
references
0
reference_url http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21626.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21626.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21626
reference_id
reference_type
scores
0
value 0.03873
scoring_system epss
scoring_elements 0.88248
published_at 2026-04-21T12:55:00Z
1
value 0.05303
scoring_system epss
scoring_elements 0.90041
published_at 2026-04-16T12:55:00Z
2
value 0.05303
scoring_system epss
scoring_elements 0.90042
published_at 2026-04-18T12:55:00Z
3
value 0.05634
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-13T12:55:00Z
4
value 0.06756
scoring_system epss
scoring_elements 0.91292
published_at 2026-04-11T12:55:00Z
5
value 0.06756
scoring_system epss
scoring_elements 0.91295
published_at 2026-04-12T12:55:00Z
6
value 0.06756
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-08T12:55:00Z
7
value 0.06756
scoring_system epss
scoring_elements 0.91266
published_at 2026-04-07T12:55:00Z
8
value 0.06756
scoring_system epss
scoring_elements 0.91285
published_at 2026-04-09T12:55:00Z
9
value 0.07448
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-02T12:55:00Z
10
value 0.07448
scoring_system epss
scoring_elements 0.91734
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21626
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
6
reference_url https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf
7
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.12
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/releases/tag/v1.1.12
8
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
9
reference_url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21626
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21626
13
reference_url http://www.openwall.com/lists/oss-security/2024/02/01/1
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://www.openwall.com/lists/oss-security/2024/02/01/1
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/3
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/3
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062532
reference_id 1062532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062532
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258725
reference_id 2258725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258725
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
reference_id 2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
18
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
19
reference_url https://access.redhat.com/errata/RHSA-2024:0645
reference_id RHSA-2024:0645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0645
20
reference_url https://access.redhat.com/errata/RHSA-2024:0662
reference_id RHSA-2024:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0662
21
reference_url https://access.redhat.com/errata/RHSA-2024:0666
reference_id RHSA-2024:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0666
22
reference_url https://access.redhat.com/errata/RHSA-2024:0670
reference_id RHSA-2024:0670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0670
23
reference_url https://access.redhat.com/errata/RHSA-2024:0684
reference_id RHSA-2024:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0684
24
reference_url https://access.redhat.com/errata/RHSA-2024:0717
reference_id RHSA-2024:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0717
25
reference_url https://access.redhat.com/errata/RHSA-2024:0748
reference_id RHSA-2024:0748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0748
26
reference_url https://access.redhat.com/errata/RHSA-2024:0752
reference_id RHSA-2024:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0752
27
reference_url https://access.redhat.com/errata/RHSA-2024:0755
reference_id RHSA-2024:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0755
28
reference_url https://access.redhat.com/errata/RHSA-2024:0756
reference_id RHSA-2024:0756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0756
29
reference_url https://access.redhat.com/errata/RHSA-2024:0757
reference_id RHSA-2024:0757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0757
30
reference_url https://access.redhat.com/errata/RHSA-2024:0758
reference_id RHSA-2024:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0758
31
reference_url https://access.redhat.com/errata/RHSA-2024:0759
reference_id RHSA-2024:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0759
32
reference_url https://access.redhat.com/errata/RHSA-2024:0760
reference_id RHSA-2024:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0760
33
reference_url https://access.redhat.com/errata/RHSA-2024:0764
reference_id RHSA-2024:0764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0764
34
reference_url https://access.redhat.com/errata/RHSA-2024:10149
reference_id RHSA-2024:10149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10149
35
reference_url https://access.redhat.com/errata/RHSA-2024:10520
reference_id RHSA-2024:10520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10520
36
reference_url https://access.redhat.com/errata/RHSA-2024:10525
reference_id RHSA-2024:10525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10525
37
reference_url https://access.redhat.com/errata/RHSA-2024:10841
reference_id RHSA-2024:10841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10841
38
reference_url https://access.redhat.com/errata/RHSA-2024:1270
reference_id RHSA-2024:1270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1270
39
reference_url https://access.redhat.com/errata/RHSA-2024:4597
reference_id RHSA-2024:4597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4597
40
reference_url https://access.redhat.com/errata/RHSA-2025:0115
reference_id RHSA-2025:0115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0115
41
reference_url https://access.redhat.com/errata/RHSA-2025:0650
reference_id RHSA-2025:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0650
42
reference_url https://access.redhat.com/errata/RHSA-2025:1711
reference_id RHSA-2025:1711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1711
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/
reference_id SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/
44
reference_url https://usn.ubuntu.com/6619-1/
reference_id USN-6619-1
reference_type
scores
url https://usn.ubuntu.com/6619-1/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2024-21626, GHSA-xr7r-f8xq-vfvv
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsgr-5mwt-jkeh
5
url VCID-v2ys-xbn5-guh4
vulnerability_id VCID-v2ys-xbn5-guh4
summary
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
### Impact
It was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons:
1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl)
2. or, when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare)

A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host .
Other users's cgroup hierarchies are not affected.

### Patches
v1.1.5 (planned)

### Workarounds
- Condition 1: Unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts.
- Condition 2 (very rare): add `/sys/fs/cgroup` to `maskedPaths`
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25809.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25809
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10176
published_at 2026-04-11T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10045
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10115
published_at 2026-04-13T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-12T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10103
published_at 2026-04-04T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10001
published_at 2026-04-07T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10077
published_at 2026-04-08T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10138
published_at 2026-04-09T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.11946
published_at 2026-04-18T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12063
published_at 2026-04-21T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1195
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:19Z/
url https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:19Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25809
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25809
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182884
reference_id 2182884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182884
9
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
10
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
11
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
12
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
13
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
14
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
15
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:ebuild/app-containers/runc@1.1.12
purl pkg:ebuild/app-containers/runc@1.1.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12
aliases CVE-2023-25809, GHSA-m8cg-xc2p-r3fc
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2ys-xbn5-guh4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-containers/runc@1.1.12