Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
Typedeb
Namespacedebian
Namerunc
Version1.1.15+ds1-2
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.3+ds1-2
Latest_non_vulnerable_version1.3.5+ds1-1
Affected_by_vulnerabilities
0
url VCID-mt76-ah1b-s3gc
vulnerability_id VCID-mt76-ah1b-s3gc
summary
runc container escape via "masked path" abuse due to mount race conditions
### Impact ###  
The OCI runtime specification has a `maskedPaths` feature that allows for files or directories to be "masked" by placing a mount on top of them to conceal their contents. This is primarily intended to protect against privileged users in non-user-namespaced from being able to write to files or access directories that would either provide sensitive information about the host to containers or allow containers to perform destructive or other privileged operations on the host (examples include `/proc/kcore`, `/proc/timer_list`, `/proc/acpi`, and `/proc/keys`).  

`maskedPaths` can be used to either mask a directory or a file -- directories are masked using a new read-only `tmpfs` instance that is mounted on top of the masked path, while files are masked by bind-mounting the container's `/dev/null` on top of the masked path.  

In all known versions of runc, when using the container's `/dev/null` to mask files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's `/dev/null`) was actually a real `/dev/null` inode. While `/dev/null` is usually created by runc when doing container creation, it is possible for an attacker to create a `/dev/null` or modify the `/dev/null` inode created by runc through race conditions with other containers sharing mounts (runc has also verified this attack is possible to exploit using a standard Dockerfile with `docker buildx build` as that also permits triggering parallel execution of containers with custom shared mounts configured).  

This could lead to two separate issues:  

#### Attack 1: Arbitrary Mount Gadget (leading to Host Information Disclosure, Host Denial of Service, or Container Escape) ####  
By replacing `/dev/null` with a symlink to an attacker-controlled path, an attacker could cause runc to bind-mount an arbitrary source path to a path inside the container. This could lead to:  
* **Host Denial of Service**: By bind-mounting files such as `/proc/sysrq-trigger`, the attacker can gain access to a read-write version of files which can be destructive to write to (`/proc/sysrq-trigger` would allow an attacker to trigger a kernel panic, shutting down the machine, or causing the machine to freeze without rebooting).  
* **Container Escape**: By bind-mounting `/proc/sys/kernel/core_pattern`, the attacker can reconfigure a coredump helper -- as kernel upcalls are not namespaced, the configured binary (which could be a container binary or a host binary with a malicious command-line) will run with full privileges on the host system. Thus, the attacker can simply trigger a coredump and gain complete root privileges over the host.  

Note that while `config.json` allows users to bind-mount arbitrary paths (and thus an attacker that can modify `config.json` arbitrarily could gain the same access as this exploit), because `maskedPaths` is applied by almost all higher-level container runtimes (and thus provides a guaranteed mount source) this flaw effectively allows any attacker that can spawn containers (with some degree of control over what kinds of containers are being spawned) to achieve the above goals. 

#### Attack 2: Bypassing `maskedPaths` ####  
While investigating Attack 1, runc discovered that the runc validation mechanism when bind-mounting `/dev/null` for `maskedPaths` would ignore `ENOENT` errors -- meaning that if an attacker deleted `/dev/null` before runc did the bind-mount, runc would silently skip applying `maskedPaths` for the container. (The original purpose of this `ENOENT`-ignore behaviour was to permit configurations where `maskedPaths` references non-existent files, but runc did not consider that the source path could also not exist in this kind of race-attack scenario.)  

With `maskedPaths` rendered inoperative, an attacker would be able to access sensitive host information from files in `/proc` that would usually be masked (such as `/proc/kcore`). However, note that `/proc/sys` and `/proc/sysrq-trigger` are mounted read-only rather than being masked with files, so this attack variant will not allow the same breakout or host denial of service attacks as in Attack 1. 

### Patches ###  
This advisory is being published as part of a set of three advisories:  
* CVE-2025-31133
* CVE-2025-52881
* CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:  
* db19bbed5348 ("internal/sys: add VerifyInode helper")  
* 8476df83b534 ("libct: add/use isDevNull, verifyDevNull")  
* 1a30a8f3d921 ("libct: maskPaths: only ignore ENOENT on mount dest")  
* 5d7b24240724 ("libct: maskPaths: don't rely on ENOTDIR for mount")  

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model](https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md), runc 1.1.x and earlier are no longer supported and thus have not been patched.  https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md  

### Mitigations ###  
- Use containers with user namespaces (with the host root user not mapped into the container's user namespace). This will block most of the most serious aspects of these attacks, as the `procfs` files used for the container breakout use Unix DAC permissions and user namespaced users will not have access to the relevant files.

  runc would also like to take this opportunity to re-iterate that runc **strongly** recommend all users use user namespaced containers. They have proven to be one of the best security hardening mechanisms against container breakouts, and the kernel applies additional restrictions to user namespaced containers above and beyond the user remapping functionality provided. With the advent of id-mapped mounts (Linux 5.12), there is very little reason to not use user namespaces for most applications. Note that using user namespaces to configure your container does not mean you have to enable unprivileged user namespace creation *inside* the container -- most container runtimes apply a seccomp-bpf profile which blocks `unshare(CLONE_NEWUSER)` inside containers regardless of whether the container itself uses user namespaces.

  Rootless containers can provide even more protection if your configuration can use them -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. 

- For non-user namespaced containers, configure all containers you spawn to not permit processes to run with root privileges. In most cases this would require configuring the container to use a non-root user and enabling `noNewPrivileges` to disable any setuid or set-capability binaries. (Note that this is runc's general recommendation for a secure container setup -- it is very difficult, if not impossible, to run an untrusted program with root privileges safely.) If you need to use `ping` in your containers, there is a `net.ipv4.ping_group_range` sysctl that can be used to allow unprivileged users to ping without requiring setuid or set-capability binaries.  
 - Do not run untrusted container images from unknown or unverified sources.  
 - Depending on the configuration of `maskedPaths`, an AppArmor profile (such as the default one applied by higher level runtimes including Docker and Podman) can block write attempts to most of `/proc` and `/sys`. This means that even with a procfs file maliciously bind-mounted to a `maskedPaths` target, all of the targets of `maskedPaths` in the default configuration of runtimes such as Docker or Podman will still not permit write access to said files. However, if a container is configured with a `maskedPaths` that is not protected by AppArmor then the same attack can be carried out. Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so this mitigation is not that helpful when considered in combination with CVE-2025-52881.  
 - Based on runc's analysis, SELinux policies have a limited effect when trying to protect against this attack. The reason is that the `/dev/null` bind-mount gets implicitly relabelled with `context=...` set to the container's SELinux context, and thus the container process will have access to the source of the bind-mount even if they otherwise wouldn't.  
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm  

### Other Runtimes ###  
As this vulnerability boils down to a fairly easy-to-make logic bug, runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability. Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a coordinated security release along with runc. LXC appears to also be vulnerable in some aspects, but [their security stance](https://linuxcontainers.org/lxc/security/) is (understandably) that non-user-namespaced containers are fundamentally insecure by design.  
https://linuxcontainers.org/lxc/security/  

### Credits ###  
Thanks to Lei Wang (@ssst0n3 from Huawei) for finding and reporting the original vulnerability (Attack 1), and Li Fubang (@lifubang from acmcoder.com, CIIC) for discovering another attack vector (Attack 2) based on @ssst0n3's initial findings.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31133.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31133
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02614
published_at 2026-04-12T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02629
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02652
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02632
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02628
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02612
published_at 2026-04-13T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02873
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03727
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04938
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05085
published_at 2026-04-21T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06666
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
6
reference_url https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
7
reference_url https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
8
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
9
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-31133
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-31133
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404705
reference_id 2404705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404705
13
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
14
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
15
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
16
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
17
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
18
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
19
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
20
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
21
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
22
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
23
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
24
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
25
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
26
reference_url https://access.redhat.com/errata/RHSA-2026:2681
reference_id RHSA-2026:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2681
27
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
28
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
29
reference_url https://access.redhat.com/errata/RHSA-2026:6492
reference_id RHSA-2026:6492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6492
30
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
31
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
fixed_packages
0
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2025-31133, GHSA-9493-h29p-rfm2
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt76-ah1b-s3gc
1
url VCID-vk37-s4p6-fufm
vulnerability_id VCID-vk37-s4p6-fufm
summary
runc container escape with malicious config due to /dev/console mount and related races
### Impact ###
This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). 

In runc version 1.0.0-rc3 and later, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). 

The reason that the attacker can gain write access to these files is because the `/dev/console` bind-mount happens before `maskedPaths` and `readonlyPaths` are applied.

#### Additional Findings ####
While investigating this issue, runc discovered some other theoretical issues that may or may not be exploitable, as well as taking the opportunity to fix some fairly well-known issues related to consoles.

##### Issue 1: Problematic Usage of `os.Create` #####
Go provides an `os.Create` function for creating files, which older code in runc (dating back to the original `libcontainer` from the early 2010s) had a tendency to use fairly liberally. `os.Create` implies `O_CREAT|O_TRUNC` but by design it does not apply `O_NOFOLLOW` nor `O_EXCL`, meaning if the target is swapped with a malicious symlink runc can be tricked into truncating host files (which can lead to denial of service attacks, among other concerns). 

Runc conducted an audit of all `os.Create` usages in runc and found some suspicious usages related to device inodes, but based on runc's testing these were not exploitable in practice. Runc now has custom code lints to block any `os.Create` usage in runc, and plan to do a further audit of any other plain `os.*` operation usage throughout runc after this advisory becomes public. 

CVE-2024-45310 was a similar attack but without the `O_TRUNC` component (which resulted in a "Low" severity) -- a similar attack being exploitable would've been much more severe.

##### Issue 2: Malicious `/dev/pts/$n` Inode Attacks (`TIOCGPTPEER`) #####
The (very) classic API for constructing consoles involves first opening `/dev/ptmx` for reading and writing. This allocates a new pseudo-terminal and the returned file descriptor is the "master" end (which is used by higher-level runtimes to do I/O with the container). 

Traditionally, in order to get the "slave" end, you do `ioctl(ptm, TIOCGPTN)` to get the pseudo-terminal number and then open the file in `/dev/pts/` with the corresponding base-10 decimal number of the number returned by `TIOCGPTN`. The naive way of doing this is vulnerable to very basic race attacks where `/dev/pts/$n` is replaced with a different pseudo-terminal or other malicious file. 

In order to provide a mechanism to mitigate this risk, Aleksa Sarai (@cyphar from SUSE) implemented `TIOCGPTPEER` back in 2017 to provide a race-free way of doing the last `TIOCGPTN` step by opening the peer end of the pseudo-terminal directly. However, at the time it was believed to be too impractical to implement this protection in runc due to its no-monitor-process architecture (unlike runtimes like LXC which made use of `TIOCGPTPEER` almost immediately). While working on this advisory, runc found a way to make `TIOCGPTN` usage on pre-4.13 kernels still safe against race attacks and so have implemented both `TIOCGPTPEER` support as well as safe `TIOCGPTN` support as a fallback. 

Another possible target of attack would be replacing `/dev/ptmx` or `/dev/pts/ptmx` with a different inode and tricking runc into trying to operate on it. This is very similar to the core issue in CVE-2025-31133 and had a similar solution. 

Runc's analysis was that while this attack appears to be potentially problematic in theory, it seems unlikely to actually be exploitable due to how consoles are treated (runc tries to do several pseudo-terminal-specific `ioctl`s and will error out if they fail -- which happens for most other file types). In principle you could imagine a DoS attack using a disconnected NFS handle but it seems impractical to exploit. However, runc felt it prudent to include a solution (and this also provides a safe mechanism to get the source mount for the `/dev/console` bind-mount issue at the beginning of this advisory).

### Patches ###
This advisory is being published as part of a set of three advisories:

  * CVE-2025-31133
  * CVE-2025-52881
  * CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:

 * db19bbed5348 ("internal/sys: add VerifyInode helper")
 * ff94f9991bd3 ("*: switch to safer securejoin.Reopen")
 * 531ef794e4ec ("console: use TIOCGPTPEER when allocating peer PTY")
 * 398955bccb7f ("console: add fallback for pre-TIOCGPTPEER kernels")
 * 9be1dbf4ac67 ("console: avoid trivial symlink attacks for /dev/console")
 * de87203e625c ("console: verify /dev/pts/ptmx before use")
 * 01de9d65dc72 ("rootfs: avoid using os.Create for new device inodes")
 * aee7d3fe355d ("ci: add lint to forbid the usage of os.Create")

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model](https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md), runc 1.1.x and earlier are no longer supported and thus have not been patched.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52565]: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
[RELEASES.md]: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md

### Mitigations ###
* Use containers with user namespaces (with the host root user not mapped into the container's user namespace). This will block most of the most serious aspects of these attacks, as the `procfs` files used for the container breakout use Unix DAC permissions and user namespaced users will not have access to the relevant files. 

An attacker would still be able to bind-mount host paths into the container but if the host uids and gids mapped into the container do not overlap with ordinary users on the host (which is the generally recommended configuration) then the attacker would likely not be able to read or write to most sensitive host files (depending on the Unix DAC permissions of the host files). Note that this is still technically more privilege than an unprivileged user on the host -- because the bind-mount is done by a privileged process, the attacker would be able to get access to directories whose parents may have denied search access (i.e., they may be able to access paths inside a `chmod 700` directory that would normally block them from resolving subpaths). 

Runc would also like to take this opportunity to re-iterate that runc **strongly** recommend all users use user namespaced containers. They have proven to be one of the best security hardening mechanisms against container breakouts, and the kernel applies additional restrictions to user namespaced containers above and beyond the user remapping functionality provided. With the advent of id-mapped mounts (Linux 5.12), there is very little reason to not use user namespaces for most applications. Note that using user namespaces to configure your container does not mean you have to enable unprivileged user namespace creation *inside* the container -- most container runtimes apply a seccomp-bpf profile which blocks `unshare(CLONE_NEWUSER)` inside containers regardless of whether the container itself uses user namespaces. 

Rootless containers can provide even more protection if your configuration can use them -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. 

 * For non-user namespaced containers, configure all containers you spawn to not permit processes to run with root privileges. In most cases this would require configuring the container to use a non-root user and enabling `noNewPrivileges` to disable any setuid or set-capability binaries. (Note that this is runc's general recommendation for a secure container setup -- it is very difficult, if not impossible, to run an untrusted program with root privileges safely.) If you need to use `ping` in your containers, there is a `net.ipv4.ping_group_range` sysctl that can be used to allow unprivileged users to ping without requiring setuid or set-capability binaries. 
 * Do not run untrusted container images from unknown or unverified sources.
 * The default `containers-selinux` SELinux policy mitigates this issue, as (unlike CVE-2025-31133) the `/dev/console` bind-mount does not get relabeled and so the container process cannot write to the bind-mounted procfs file by default.

   Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so this mitigation is not that helpful when considered in combination with CVE-2025-52881.

 * The default AppArmor policy used by Docker and Podman does not mitigate this issue (as access to `/dev/console`) is usually permitted. Users could create a custom profile that blocks access to `/dev/console`, but such a profile might break regular containers.

   Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so the mitigation provided with a custom profile is not that helpful when considered in combination with CVE-2025-52881.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm

### Other Runtimes ###
As this vulnerability boils down to a fairly easy-to-make logic bug,runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability.

Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a co-ordinated security release along with runc. LXC appears to also be vulnerable in some aspects, but [their security stance][lxc-security] is (understandably) that non-user-namespaced containers are fundamentally insecure by design.

[lxc-security]: https://linuxcontainers.org/lxc/security/

### Credits ###

Thanks to Lei Wang (@ssst0n3 from Huawei) and Li Fubang (@lifubang from acmcoder.com, CIIC) for discovering and reporting the main `/dev/console` bind-mount vulnerability, as well as Aleksa Sarai (@cyphar from SUSE) for discovering Issues 1 and 2 and the original research into these classes of issues several years ago.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52565.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52565
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04296
published_at 2026-04-08T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04268
published_at 2026-04-13T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04289
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04265
published_at 2026-04-07T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04311
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04617
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-16T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06685
published_at 2026-04-18T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06842
published_at 2026-04-21T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/01de9d65dc72f67b256ef03f9bfb795a2bf143b4
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/01de9d65dc72f67b256ef03f9bfb795a2bf143b4
6
reference_url https://github.com/opencontainers/runc/commit/398955bccb7f20565c224a3064d331c19e422398
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/398955bccb7f20565c224a3064d331c19e422398
7
reference_url https://github.com/opencontainers/runc/commit/531ef794e4ecd628006a865ad334a048ee2b4b2e
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/531ef794e4ecd628006a865ad334a048ee2b4b2e
8
reference_url https://github.com/opencontainers/runc/commit/9be1dbf4ac67d9840a043ebd2df5c68f36705d1d
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/9be1dbf4ac67d9840a043ebd2df5c68f36705d1d
9
reference_url https://github.com/opencontainers/runc/commit/aee7d3fe355dd02939d44155e308ea0052e0d53a
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/aee7d3fe355dd02939d44155e308ea0052e0d53a
10
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
11
reference_url https://github.com/opencontainers/runc/commit/de87203e625cd7a27141fb5f2ad00a320c69c5e8
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/de87203e625cd7a27141fb5f2ad00a320c69c5e8
12
reference_url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
13
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-06T21:32:07Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-52565
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-52565
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404708
reference_id 2404708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404708
17
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
18
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
19
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
20
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
21
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
22
reference_url https://access.redhat.com/errata/RHSA-2025:23078
reference_id RHSA-2025:23078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23078
23
reference_url https://access.redhat.com/errata/RHSA-2025:23079
reference_id RHSA-2025:23079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23079
24
reference_url https://access.redhat.com/errata/RHSA-2025:23080
reference_id RHSA-2025:23080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23080
25
reference_url https://access.redhat.com/errata/RHSA-2025:23202
reference_id RHSA-2025:23202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23202
26
reference_url https://access.redhat.com/errata/RHSA-2025:23204
reference_id RHSA-2025:23204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23204
27
reference_url https://access.redhat.com/errata/RHSA-2025:23205
reference_id RHSA-2025:23205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23205
28
reference_url https://access.redhat.com/errata/RHSA-2025:23209
reference_id RHSA-2025:23209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23209
29
reference_url https://access.redhat.com/errata/RHSA-2025:23449
reference_id RHSA-2025:23449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23449
30
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
31
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
32
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
33
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
34
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
35
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
36
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
37
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
38
reference_url https://access.redhat.com/errata/RHSA-2026:3461
reference_id RHSA-2026:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3461
39
reference_url https://access.redhat.com/errata/RHSA-2026:3462
reference_id RHSA-2026:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3462
40
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
41
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
42
reference_url https://access.redhat.com/errata/RHSA-2026:6492
reference_id RHSA-2026:6492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6492
43
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
44
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
fixed_packages
0
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2025-52565, GHSA-qw9x-cqr3-wc7r
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk37-s4p6-fufm
2
url VCID-wxsf-mu1t-aqa4
vulnerability_id VCID-wxsf-mu1t-aqa4
summary
runc container escape and denial of service due to arbitrary write gadgets and procfs write redirects
### Impact ###

This attack is primarily a more sophisticated version of CVE-2019-19921, which was a flaw which allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy `tmpfs` file and thus not apply the correct LSM labels to the container process. The mitigation runc applied for CVE-2019-19921 was fairly limited and effectively only caused runc to verify that when runc writes LSM labels that those labels are actual procfs files.

Rather than using a fake `tmpfs` file for `/proc/self/attr/<label>`, an attacker could instead (through various means) make `/proc/self/attr/<label>` reference a real `procfs` file, but one that would still be a no-op (such as `/proc/self/sched`). This would have the same effect but would clear the "is a procfs file" check. Runc is aware that this kind of attack would be possible (even going so far as to discuss this publicly as "future work" at conferences), and runc is working on a far more comprehensive mitigation of this attack, but this security issue was disclosed before runc could complete this work.

In all known versions of runc, an attacker can trick runc into misdirecting writes to `/proc` to other procfs files through the use of a racing container with shared mounts (runc has also verified this attack is possible to exploit using a standard Dockerfile with `docker buildx build` as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a `tmpfs` or theoretically other methods such as regular bind-mounts.

Note that while `/proc/self/attr/<label>` was the example used above (which is LSM-specific), this issue affect all writes to `/proc` in runc and thus also affects sysctls (written to `/proc/sys/...`) and some other APIs.

#### Additional Impacts ####

While investigating this issue, runc discovered that another risk with these redirected writes is that they could be redirected to dangerous files such as `/proc/sysrq-trigger` rather than just no-op files like `/proc/self/sched`. For instance, the default AppArmor profile name in Docker is `docker-default`, which when written to `/proc/sysrq-trigger` would cause the host system to crash.

When this was discovered, runc conducted an audit of other write operations within runc and found several possible areas where runc could be used as a semi-arbitrary write gadget when combined with the above race attacks. The most concerning attack scenario was the configuration of sysctls. Because the contents of the sysctl are free-form text, an attacker could use a misdirected write to write to `/proc/sys/kernel/core_pattern` and break out of the container (as described in CVE-2025-31133, kernel upcalls are not namespaced and so coredump helpers will run with complete root privileges on the host). Even if the attacker cannot configure custom sysctls, a valid sysctl string (when redirected to `/proc/sysrq-trigger`) can easily cause the machine to hang.

Note that the fact that this attack allows you to disable LSM labels makes it a very useful attack to combine with CVE-2025-31133 (as one of the only mitigations available to most users for that issue is AppArmor, and this attack would let you bypass that). However, the misdirected write issue above means that you could also achieve most of the same goals without needing to chain together attacks.

### Patches ###

This advisory is being published as part of a set of three advisories:

  * CVE-2025-31133
  * CVE-2025-52881
  * CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:

 * db19bbed5348 ("internal/sys: add VerifyInode helper")
 * 6fc191449109 ("internal: move utils.MkdirAllInRoot to internal/pathrs")
 * ff94f9991bd3 ("*: switch to safer securejoin.Reopen")
 * 44a0fcf685db ("go.mod: update to github.com/cyphar/filepath-securejoin@v0.5.0")
 * 77889b56db93 ("internal: add wrappers for securejoin.Proc*")
 * fdcc9d3cad2f ("apparmor: use safe procfs API for labels")
 * ff6fe1324663 ("utils: use safe procfs for /proc/self/fd loop code")
 * b3dd1bc562ed ("utils: remove unneeded EnsureProcHandle")
 * 77d217c7c377 ("init: write sysctls using safe procfs API")
 * 435cc81be6b7 ("init: use securejoin for /proc/self/setgroups")
 * d61fd29d854b ("libct/system: use securejoin for /proc/$pid/stat")
 * 4b37cd93f86e ("libct: align param type for mountCgroupV1/V2 functions")
 * d40b3439a961 ("rootfs: switch to fd-based handling of mountpoint targets")
 * ed6b1693b8b3 ("selinux: use safe procfs API for labels")
   - Please note that this patch includes a private patch for `github.com/opencontainers/selinux` that could not be made public through a public pull request (as it would necessarily disclose this embargoed security issue).

     The patch includes a complete copy of the forked code and a `replace` directive (as well as `go mod vendor` applied), which should still work with downstream build systems. If you cannot apply this patch, you can safely drop it -- some of the other patches in this series should block these kinds of racing mount attacks entirely.

     See https://github.com/opencontainers/selinux/pull/237 for the upstream patch.
 * 3f925525b44d ("rootfs: re-allow dangling symlinks in mount targets")
 * a41366e74080 ("openat2: improve resilience on busy systems")

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model][RELEASES.md], runc 1.1.x and earlier are no longer supported and thus have not been patched.

[CVE-2025-31133]: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[CVE-2025-52565]: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[CVE-2025-52881]: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
[RELEASES.md]: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md

### Mitigations ###

 * Do not run untrusted container images from unknown or unverified sources.

 * For the basic no-op attack, this attack allows a container process to run with the same LSM labels as `runc`. For most AppArmor deployments this means it will be `unconfined`, and for SELinux it will likely be `container_runtime_t`. Runc has not conducted in-depth testing of the impact on SELinux -- it is possible that it provides some reasonable protection but it seems likely that an attacker could cause harm to systems even with such an SELinux setup.

 * For the more involved redirect and write gadget attacks, unfortunately most LSM profiles (including the standard container-selinux profiles) provide the container runtime access to sysctl files (including `/proc/sysrq-trigger`) and so LSMs likely do not provide much protection against these attacks.

 * Using rootless containers provides some protection against these kinds of bugs (privileged writes in runc being redirected) -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. For this particular bug, the privilege escalation caused by the inadvertent write issue is entirely mitigated with rootless containers because the unprivileged user that the `runc` process is executing as cannot write to the aforementioned procfs files (even intentionally).

### Other Runtimes ###

As this vulnerability boils down to a fairly easy-to-make logic bug, runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability.

Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a co-ordinated security release along with runc. LXC appears to use the host's `/proc` for all procfs operations, and so is likely not vulnerable to this issue (this is a trade-off -- runc uses the container's procfs to avoid CVE-2016-9962-style attacks).

[CVE-2016-9962]: https://seclists.org/fulldisclosure/2017/Jan/21

### Credits ###

Thanks to Li Fubang (@lifubang from acmcoder.com, CIIC) and Tõnis Tiigi (@tonistiigi from Docker) for both independently discovering this vulnerability, as well as Aleksa Sarai (@cyphar from SUSE) for the original research into this class of security issues and solutions.

Additional thanks go to Tõnis Tiigi for finding some very useful exploit templates for these kinds of race attacks using `docker buildx build`.
references
0
reference_url http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
1
reference_url http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52881.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52881.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52881
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03374
published_at 2026-04-09T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03354
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03349
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03341
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03284
published_at 2026-04-13T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03306
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03335
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-21T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0447
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09595
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52881
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
7
reference_url https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
8
reference_url https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
9
reference_url https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
10
reference_url https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
11
reference_url https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
12
reference_url https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
13
reference_url https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
14
reference_url https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
15
reference_url https://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
16
reference_url https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
17
reference_url https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
18
reference_url https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
19
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
20
reference_url https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
21
reference_url https://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
22
reference_url https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
23
reference_url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
24
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
25
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
26
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
27
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T21:06:59Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
28
reference_url https://github.com/opencontainers/selinux/pull/237
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/pull/237
29
reference_url https://github.com/opencontainers/selinux/releases/tag/v1.13.0
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/releases/tag/v1.13.0
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-52881
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-52881
31
reference_url https://pkg.go.dev/github.com/cyphar/filepath-securejoin/pathrs-lite/procfs
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/github.com/cyphar/filepath-securejoin/pathrs-lite/procfs
32
reference_url https://youtu.be/tGseJW_uBB8
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://youtu.be/tGseJW_uBB8
33
reference_url https://youtu.be/y1PaBzxwRWQ
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://youtu.be/y1PaBzxwRWQ
34
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404715
reference_id 2404715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404715
36
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
37
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
38
reference_url https://access.redhat.com/errata/RHSA-2025:21220
reference_id RHSA-2025:21220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21220
39
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
40
reference_url https://access.redhat.com/errata/RHSA-2025:21633
reference_id RHSA-2025:21633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21633
41
reference_url https://access.redhat.com/errata/RHSA-2025:21634
reference_id RHSA-2025:21634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21634
42
reference_url https://access.redhat.com/errata/RHSA-2025:21702
reference_id RHSA-2025:21702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21702
43
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
44
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
45
reference_url https://access.redhat.com/errata/RHSA-2025:22011
reference_id RHSA-2025:22011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22011
46
reference_url https://access.redhat.com/errata/RHSA-2025:22012
reference_id RHSA-2025:22012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22012
47
reference_url https://access.redhat.com/errata/RHSA-2025:22030
reference_id RHSA-2025:22030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22030
48
reference_url https://access.redhat.com/errata/RHSA-2025:23347
reference_id RHSA-2025:23347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23347
49
reference_url https://access.redhat.com/errata/RHSA-2025:23543
reference_id RHSA-2025:23543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23543
50
reference_url https://access.redhat.com/errata/RHSA-2026:0050
reference_id RHSA-2026:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0050
51
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
52
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
53
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
54
reference_url https://access.redhat.com/errata/RHSA-2026:0424
reference_id RHSA-2026:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0424
55
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
56
reference_url https://access.redhat.com/errata/RHSA-2026:0426
reference_id RHSA-2026:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0426
57
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
58
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
59
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
60
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
61
reference_url https://access.redhat.com/errata/RHSA-2026:1730
reference_id RHSA-2026:1730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1730
62
reference_url https://access.redhat.com/errata/RHSA-2026:1942
reference_id RHSA-2026:1942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1942
63
reference_url https://access.redhat.com/errata/RHSA-2026:2034
reference_id RHSA-2026:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2034
64
reference_url https://access.redhat.com/errata/RHSA-2026:2106
reference_id RHSA-2026:2106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2106
65
reference_url https://access.redhat.com/errata/RHSA-2026:2343
reference_id RHSA-2026:2343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2343
66
reference_url https://access.redhat.com/errata/RHSA-2026:2456
reference_id RHSA-2026:2456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2456
67
reference_url https://access.redhat.com/errata/RHSA-2026:2681
reference_id RHSA-2026:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2681
68
reference_url https://access.redhat.com/errata/RHSA-2026:2695
reference_id RHSA-2026:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2695
69
reference_url https://access.redhat.com/errata/RHSA-2026:2754
reference_id RHSA-2026:2754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2754
70
reference_url https://access.redhat.com/errata/RHSA-2026:2762
reference_id RHSA-2026:2762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2762
71
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
72
reference_url https://access.redhat.com/errata/RHSA-2026:2951
reference_id RHSA-2026:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2951
73
reference_url https://access.redhat.com/errata/RHSA-2026:2975
reference_id RHSA-2026:2975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2975
74
reference_url https://access.redhat.com/errata/RHSA-2026:3391
reference_id RHSA-2026:3391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3391
75
reference_url https://access.redhat.com/errata/RHSA-2026:3416
reference_id RHSA-2026:3416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3416
76
reference_url https://access.redhat.com/errata/RHSA-2026:3713
reference_id RHSA-2026:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3713
77
reference_url https://access.redhat.com/errata/RHSA-2026:4185
reference_id RHSA-2026:4185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4185
78
reference_url https://access.redhat.com/errata/RHSA-2026:4215
reference_id RHSA-2026:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4215
79
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
80
reference_url https://access.redhat.com/errata/RHSA-2026:4532
reference_id RHSA-2026:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4532
81
reference_url https://access.redhat.com/errata/RHSA-2026:4533
reference_id RHSA-2026:4533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4533
82
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
83
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
84
reference_url https://access.redhat.com/errata/RHSA-2026:8433
reference_id RHSA-2026:8433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8433
85
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
fixed_packages
0
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2025-52881, GHSA-cgrx-mc8f-2prm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxsf-mu1t-aqa4
Fixing_vulnerabilities
0
url VCID-165g-hgmx-nybk
vulnerability_id VCID-165g-hgmx-nybk
summary
Information Exposure in RunC
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2017-0116.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2017-0116.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0123.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2017-0123.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2017-0127.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2017-0127.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9962.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9962.json
4
reference_url https://access.redhat.com/security/vulnerabilities/cve-2016-9962
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/vulnerabilities/cve-2016-9962
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9962
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32067
published_at 2026-04-07T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32242
published_at 2026-04-04T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32205
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32078
published_at 2026-04-01T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32063
published_at 2026-04-21T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32079
published_at 2026-04-13T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.3211
published_at 2026-04-12T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32149
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32144
published_at 2026-04-09T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32117
published_at 2026-04-08T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.3209
published_at 2026-04-18T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32112
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9962
6
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962
8
reference_url http://seclists.org/fulldisclosure/2017/Jan/21
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2017/Jan/21
9
reference_url http://seclists.org/fulldisclosure/2017/Jan/29
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2017/Jan/29
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/docker/docker/releases/tag/v1.12.6
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/releases/tag/v1.12.6
12
reference_url https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5
13
reference_url https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9962
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-9962
19
reference_url https://security.gentoo.org/glsa/201701-34
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-34
20
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962
21
reference_url http://www.securityfocus.com/archive/1/540001/100/0/threaded
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/archive/1/540001/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/95361
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/95361
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1409531
reference_id 1409531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1409531
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850951
reference_id 850951
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850951
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850952
reference_id 850952
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850952
26
reference_url https://security.archlinux.org/ASA-201701-19
reference_id ASA-201701-19
reference_type
scores
url https://security.archlinux.org/ASA-201701-19
27
reference_url https://security.archlinux.org/ASA-201805-11
reference_id ASA-201805-11
reference_type
scores
url https://security.archlinux.org/ASA-201805-11
28
reference_url https://security.archlinux.org/AVG-133
reference_id AVG-133
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-133
29
reference_url https://security.archlinux.org/AVG-134
reference_id AVG-134
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-134
30
reference_url https://access.redhat.com/errata/RHSA-2017:0116
reference_id RHSA-2017:0116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0116
31
reference_url https://access.redhat.com/errata/RHSA-2017:0123
reference_id RHSA-2017:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0123
32
reference_url https://access.redhat.com/errata/RHSA-2017:0127
reference_id RHSA-2017:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0127
fixed_packages
0
url pkg:deb/debian/runc@0.1.1%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/runc@0.1.1%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@0.1.1%252Bdfsg1-2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2016-9962, GHSA-gp4j-w3vj-7299
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-165g-hgmx-nybk
1
url VCID-3m4n-58pj-mkeb
vulnerability_id VCID-3m4n-58pj-mkeb
summary Multiple vulnerabilities have been discovered in runc, the worst of which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29162.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29162
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31945
published_at 2026-04-13T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.31979
published_at 2026-04-16T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32074
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.31931
published_at 2026-04-21T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-18T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32018
published_at 2026-04-11T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32015
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.31986
published_at 2026-04-08T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-07T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32114
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5
5
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/releases/tag/v1.1.2
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66
7
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29162
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29162
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2086398
reference_id 2086398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2086398
13
reference_url https://security.archlinux.org/AVG-2707
reference_id AVG-2707
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2707
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/
reference_id AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/
reference_id D77CKD3AXPMU4PMQIQI5Q74SI4JATNND
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/
16
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/
reference_id GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/
18
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
19
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
20
reference_url https://access.redhat.com/errata/RHSA-2022:7469
reference_id RHSA-2022:7469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7469
21
reference_url https://access.redhat.com/errata/RHSA-2022:8090
reference_id RHSA-2022:8090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8090
22
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.3%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.3%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.3%252Bds1-1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
5
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2022-29162, GHSA-f3fp-gc8g-vw66
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4n-58pj-mkeb
2
url VCID-3yvf-q4uj-dbdh
vulnerability_id VCID-3yvf-q4uj-dbdh
summary
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC
### Impact

In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration.

This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces.

Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter.

However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios.

The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date.

### Patches
The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed.

### Workarounds
To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.

### References
* commit d72d057ba794 ("runc init: avoid netlink message length overflows")
* https://bugs.chromium.org/p/project-zero/issues/detail?id=2241

### Credits
Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive.

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/opencontainers/runc)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43784.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43784
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30027
published_at 2026-04-21T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30072
published_at 2026-04-18T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-16T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30078
published_at 2026-04-13T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30175
published_at 2026-04-01T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30128
published_at 2026-04-12T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30171
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30168
published_at 2026-04-09T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30132
published_at 2026-04-08T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30073
published_at 2026-04-07T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30255
published_at 2026-04-04T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30206
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43784
2
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
6
reference_url https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
7
reference_url https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77
8
reference_url https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
9
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
10
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:32Z/
url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-43784
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-43784
13
reference_url https://pkg.go.dev/vuln/GO-2022-0274
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0274
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2029439
reference_id 2029439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2029439
15
reference_url https://security.archlinux.org/AVG-2599
reference_id AVG-2599
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2599
16
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
17
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
18
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.0.3%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.0.3%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.3%252Bds1-1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
5
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2021-43784, GHSA-v95c-p5hm-xq8f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yvf-q4uj-dbdh
3
url VCID-7juj-78y7-g7b6
vulnerability_id VCID-7juj-78y7-g7b6
summary
Containment Errors (Container Errors)
runc allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to `/proc/self/exe`.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
10
reference_url http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html
11
reference_url http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5736.json
13
reference_url https://access.redhat.com/security/cve/cve-2019-5736
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2019-5736
14
reference_url https://access.redhat.com/security/vulnerabilities/runcescape
reference_id
reference_type
scores
url https://access.redhat.com/security/vulnerabilities/runcescape
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5736
reference_id
reference_type
scores
0
value 0.55296
scoring_system epss
scoring_elements 0.98049
published_at 2026-04-01T12:55:00Z
1
value 0.55296
scoring_system epss
scoring_elements 0.98076
published_at 2026-04-18T12:55:00Z
2
value 0.55296
scoring_system epss
scoring_elements 0.98055
published_at 2026-04-02T12:55:00Z
3
value 0.55296
scoring_system epss
scoring_elements 0.98057
published_at 2026-04-04T12:55:00Z
4
value 0.59178
scoring_system epss
scoring_elements 0.98234
published_at 2026-04-13T12:55:00Z
5
value 0.59178
scoring_system epss
scoring_elements 0.98239
published_at 2026-04-21T12:55:00Z
6
value 0.59178
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-07T12:55:00Z
7
value 0.59178
scoring_system epss
scoring_elements 0.98231
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5736
16
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
reference_id
reference_type
scores
url https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
17
reference_url https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
reference_id
reference_type
scores
url https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
18
reference_url https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
reference_id
reference_type
scores
url https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
19
reference_url https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
reference_id
reference_type
scores
url https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
20
reference_url https://brauner.github.io/2019/02/12/privileged-containers.html
reference_id
reference_type
scores
url https://brauner.github.io/2019/02/12/privileged-containers.html
21
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1121967
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1121967
22
reference_url https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
reference_id
reference_type
scores
url https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url https://github.com/docker/docker-ce/releases/tag/v18.09.2
reference_id
reference_type
scores
url https://github.com/docker/docker-ce/releases/tag/v18.09.2
26
reference_url https://github.com/Frichetten/CVE-2019-5736-PoC
reference_id
reference_type
scores
url https://github.com/Frichetten/CVE-2019-5736-PoC
27
reference_url https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
reference_id
reference_type
scores
url https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
28
reference_url https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
reference_id
reference_type
scores
url https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
29
reference_url https://github.com/q3k/cve-2019-5736-poc
reference_id
reference_type
scores
url https://github.com/q3k/cve-2019-5736-poc
30
reference_url https://github.com/rancher/runc-cve
reference_id
reference_type
scores
url https://github.com/rancher/runc-cve
31
reference_url https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
reference_id
reference_type
scores
url https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
32
reference_url https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3%40%3Cdev.dlab.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706%40%3Cuser.mesos.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46%40%3Cdev.dlab.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e%40%3Cdev.dlab.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c%40%3Cdev.mesos.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587%40%3Cdev.dlab.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
42
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
43
reference_url https://security.netapp.com/advisory/ntap-20190307-0008/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190307-0008/
44
reference_url https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944
reference_id
reference_type
scores
url https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944
45
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us
46
reference_url https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
reference_id
reference_type
scores
url https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
47
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
reference_id
reference_type
scores
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
48
reference_url https://www.exploit-db.com/exploits/46359/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46359/
49
reference_url https://www.exploit-db.com/exploits/46369/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46369/
50
reference_url https://www.openwall.com/lists/oss-security/2019/02/11/2
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/02/11/2
51
reference_url https://www.synology.com/security/advisory/Synology_SA_19_06
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_19_06
52
reference_url https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
reference_id
reference_type
scores
url https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
53
reference_url http://www.openwall.com/lists/oss-security/2019/03/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/03/23/1
54
reference_url http://www.openwall.com/lists/oss-security/2019/06/28/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/06/28/2
55
reference_url http://www.openwall.com/lists/oss-security/2019/07/06/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/07/06/3
56
reference_url http://www.openwall.com/lists/oss-security/2019/07/06/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/07/06/4
57
reference_url http://www.openwall.com/lists/oss-security/2019/10/24/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/24/1
58
reference_url http://www.openwall.com/lists/oss-security/2019/10/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/29/3
59
reference_url http://www.openwall.com/lists/oss-security/2024/01/31/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/01/31/6
60
reference_url http://www.openwall.com/lists/oss-security/2024/02/01/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/02/01/1
61
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/02/02/3
62
reference_url http://www.securityfocus.com/bid/106976
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106976
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664908
reference_id 1664908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664908
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050
reference_id 922050
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050
65
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169
reference_id 922169
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922169
66
reference_url https://security.archlinux.org/ASA-201902-20
reference_id ASA-201902-20
reference_type
scores
url https://security.archlinux.org/ASA-201902-20
67
reference_url https://security.archlinux.org/ASA-201902-6
reference_id ASA-201902-6
reference_type
scores
url https://security.archlinux.org/ASA-201902-6
68
reference_url https://security.archlinux.org/AVG-878
reference_id AVG-878
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-878
69
reference_url https://security.archlinux.org/AVG-880
reference_id AVG-880
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-880
70
reference_url https://security.archlinux.org/AVG-892
reference_id AVG-892
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-892
71
reference_url https://security.archlinux.org/AVG-893
reference_id AVG-893
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-893
72
reference_url https://security.archlinux.org/AVG-895
reference_id AVG-895
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-895
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:d2iq:kubernetes_engine:*:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:kubernetes_engine:-:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:onesphere:-:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.08:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microfocus:service_management_automation:2018.11:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:container_development_kit:3.7:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:d2iq:dc\/os:*:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
111
reference_url https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736
reference_id CVE-2019-5736
reference_type exploit
scores
url https://github.com/feexd/pocs/tree/a5aac58e0935a505c034b5f9e6cf35c1fc67471d/CVE-2019-5736
112
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md
reference_id CVE-2019-5736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46359.md
113
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md
reference_id CVE-2019-5736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46369.md
114
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5736
reference_id CVE-2019-5736
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-5736
115
reference_url https://www.openwall.com/lists/oss-security/2019/02/13/3
reference_id CVE-2019-5736
reference_type exploit
scores
url https://www.openwall.com/lists/oss-security/2019/02/13/3
116
reference_url https://security.gentoo.org/glsa/202003-21
reference_id GLSA-202003-21
reference_type
scores
url https://security.gentoo.org/glsa/202003-21
117
reference_url https://access.redhat.com/errata/RHSA-2019:0303
reference_id RHSA-2019:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0303
118
reference_url https://access.redhat.com/errata/RHSA-2019:0304
reference_id RHSA-2019:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0304
119
reference_url https://access.redhat.com/errata/RHSA-2019:0401
reference_id RHSA-2019:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0401
120
reference_url https://access.redhat.com/errata/RHSA-2019:0408
reference_id RHSA-2019:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0408
121
reference_url https://access.redhat.com/errata/RHSA-2019:0975
reference_id RHSA-2019:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0975
122
reference_url https://usn.ubuntu.com/4048-1/
reference_id USN-4048-1
reference_type
scores
url https://usn.ubuntu.com/4048-1/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc6%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc6%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc6%252Bdfsg1-2%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2019-5736
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7juj-78y7-g7b6
4
url VCID-997v-f2ds-e3e4
vulnerability_id VCID-997v-f2ds-e3e4
summary
Multiple vulnerabilities have been discovered in runC, the worst of
    which may lead to privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html
1
reference_url https://access.redhat.com/errata/RHSA-2020:0688
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0688
2
reference_url https://access.redhat.com/errata/RHSA-2020:0695
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0695
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19921.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19921.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19921
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31922
published_at 2026-04-21T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32005
published_at 2026-04-09T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31976
published_at 2026-04-08T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31924
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.32102
published_at 2026-04-04T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.32062
published_at 2026-04-02T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31934
published_at 2026-04-01T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-13T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31948
published_at 2026-04-18T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31969
published_at 2026-04-16T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.32008
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921
6
reference_url https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0
7
reference_url https://github.com/opencontainers/runc/issues/2197
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/issues/2197
8
reference_url https://github.com/opencontainers/runc/pull/2190
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2190
9
reference_url https://github.com/opencontainers/runc/pull/2207
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2207
10
reference_url https://github.com/opencontainers/runc/releases
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases
11
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/security/advisories/GHSA-fh74-hm69-rqjw
12
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19921
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19921
19
reference_url https://pkg.go.dev/vuln/GO-2021-0087
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0087
20
reference_url https://security-tracker.debian.org/tracker/CVE-2019-19921
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2019-19921
21
reference_url https://usn.ubuntu.com/4297-1
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4297-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796107
reference_id 1796107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796107
23
reference_url https://security.gentoo.org/glsa/202003-21
reference_id GLSA-202003-21
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202003-21
24
reference_url https://access.redhat.com/errata/RHSA-2020:0942
reference_id RHSA-2020:0942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0942
25
reference_url https://access.redhat.com/errata/RHSA-2020:1485
reference_id RHSA-2020:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1485
26
reference_url https://usn.ubuntu.com/4297-1/
reference_id USN-4297-1
reference_type
scores
url https://usn.ubuntu.com/4297-1/
27
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc10%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc10%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc10%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2019-19921, GHSA-fh74-hm69-rqjw
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-997v-f2ds-e3e4
5
url VCID-9mdg-3961-cybf
vulnerability_id VCID-9mdg-3961-cybf
summary
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
### Summary

runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby
an attacker can request a seemingly-innocuous container configuration that
actually results in the host filesystem being bind-mounted into the container
(allowing for a container escape). CVE-2021-30465 has been assigned for this
issue.

An attacker must have the ability to start containers using some kind of custom
volume configuration, and while recommended container hardening mechanisms such
as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of
damage an attacker could do, they do not block this attack outright. We have a
reproducer using Kubernetes (and the below description mentions
Kubernetes-specific paths), but this is not a Kubernetes-specific issue.

The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we
recommend users update as soon as possible.

[release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95

### Details

In circumstances where a container is being started, and runc is mounting
inside a volume shared with another container (which is conducting a
symlink-exchange attack), runc can be tricked into mounting outside of the
container rootfs by swapping the target of a mount with a symlink due to a
time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to
previous TOCTTOU attacks (and is a problem we are working on solving with
libpathrs).

However, this alone is not useful because this happens inside a mount namespace
with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't
appear on the host -- it's only a "host-side mount" inside the container's
namespace). To exploit this, you must have additional mount entries in the
configuration that use some subpath of the mounted-over host path as a source
for a subsequent mount.

However, it turns out with some container orchestrators (such as Kubernetes --
though it is very likely that other downstream users of runc could have similar
behaviour be accessible to untrusted users), the existence of additional volume
management infrastructure allows this attack to be applied to gain access to
the host filesystem without requiring the attacker to have completely arbitrary
control over container configuration.

In the case of Kubernetes, this is exploitable by creating a symlink in a
volume to the top-level (well-known) directory where volumes are sourced from
(for instance,
`/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then
using that symlink as the target of a mount. The source of the mount is an
attacker controlled directory, and thus the source directory from which
subsequent mounts will occur is an attacker-controlled directory. Thus the
attacker can first place a symlink to `/` in their malicious source directory
with the name of a volume, and a subsequent mount in the container will
bind-mount `/` into the container.

Applying this attack requires the attacker to start containers with a slightly
peculiar volume configuration (though not explicitly malicious-looking such as
bind-mounting `/` into the container explicitly), and be able to run malicious
code in a container that shares volumes with said volume configuration. It
helps the attacker if the host paths used for volume management are well known,
though this is not a hard requirement.

### Patches
This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as
possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f).

### Workarounds

There are no known workarounds for this issue.

However, users who enforce running containers with more confined security
profiles (such as reduced capabilities, not running code as root in the
container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what
an attacker can do in the case of a container breakout -- we recommend users
make use of strict security profiles if possible (most notably user namespaces
-- which can massively restrict the impact a container breakout can have on the
host system).

### References
* [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f)
* [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2)

### Credit

Thanks to Etienne Champetier for discovering and disclosing this vulnerability,
to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp
for testing it.

### For more information

If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues).
* Email us at <security@opencontainers.org>.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30465.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30465
reference_id
reference_type
scores
0
value 0.01473
scoring_system epss
scoring_elements 0.80881
published_at 2026-04-01T12:55:00Z
1
value 0.01473
scoring_system epss
scoring_elements 0.80913
published_at 2026-04-04T12:55:00Z
2
value 0.01473
scoring_system epss
scoring_elements 0.8089
published_at 2026-04-02T12:55:00Z
3
value 0.02175
scoring_system epss
scoring_elements 0.84354
published_at 2026-04-18T12:55:00Z
4
value 0.02175
scoring_system epss
scoring_elements 0.84353
published_at 2026-04-16T12:55:00Z
5
value 0.02175
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-21T12:55:00Z
6
value 0.02358
scoring_system epss
scoring_elements 0.8492
published_at 2026-04-13T12:55:00Z
7
value 0.02358
scoring_system epss
scoring_elements 0.84879
published_at 2026-04-07T12:55:00Z
8
value 0.02358
scoring_system epss
scoring_elements 0.84902
published_at 2026-04-08T12:55:00Z
9
value 0.02358
scoring_system epss
scoring_elements 0.84909
published_at 2026-04-09T12:55:00Z
10
value 0.02358
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-11T12:55:00Z
11
value 0.02358
scoring_system epss
scoring_elements 0.84926
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30465
2
reference_url https://bugzilla.opensuse.org/show_bug.cgi?id=1185405
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.opensuse.org/show_bug.cgi?id=1185405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f
6
reference_url https://github.com/opencontainers/runc/releases
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases
7
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r
8
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-30465
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-30465
12
reference_url https://security.gentoo.org/glsa/202107-26
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202107-26
13
reference_url https://security.netapp.com/advisory/ntap-20210708-0003
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210708-0003
14
reference_url http://www.openwall.com/lists/oss-security/2021/05/19/2
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/05/19/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1954736
reference_id 1954736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1954736
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988768
reference_id 988768
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988768
17
reference_url https://security.archlinux.org/ASA-202105-17
reference_id ASA-202105-17
reference_type
scores
url https://security.archlinux.org/ASA-202105-17
18
reference_url https://security.archlinux.org/AVG-1972
reference_id AVG-1972
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1972
19
reference_url https://access.redhat.com/errata/RHSA-2021:1562
reference_id RHSA-2021:1562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1562
20
reference_url https://access.redhat.com/errata/RHSA-2021:1566
reference_id RHSA-2021:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1566
21
reference_url https://access.redhat.com/errata/RHSA-2021:2057
reference_id RHSA-2021:2057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2057
22
reference_url https://access.redhat.com/errata/RHSA-2021:2144
reference_id RHSA-2021:2144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2144
23
reference_url https://access.redhat.com/errata/RHSA-2021:2145
reference_id RHSA-2021:2145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2145
24
reference_url https://access.redhat.com/errata/RHSA-2021:2150
reference_id RHSA-2021:2150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2150
25
reference_url https://access.redhat.com/errata/RHSA-2021:2291
reference_id RHSA-2021:2291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2291
26
reference_url https://access.redhat.com/errata/RHSA-2021:2292
reference_id RHSA-2021:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2292
27
reference_url https://access.redhat.com/errata/RHSA-2021:2370
reference_id RHSA-2021:2370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2370
28
reference_url https://access.redhat.com/errata/RHSA-2021:2371
reference_id RHSA-2021:2371
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2371
29
reference_url https://usn.ubuntu.com/4960-1/
reference_id USN-4960-1
reference_type
scores
url https://usn.ubuntu.com/4960-1/
30
reference_url https://usn.ubuntu.com/USN-4867-1/
reference_id USN-USN-4867-1
reference_type
scores
url https://usn.ubuntu.com/USN-4867-1/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2021-30465, GHSA-c3xm-pvg7-gh7r
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mdg-3961-cybf
6
url VCID-jc1e-8tt4-xqdn
vulnerability_id VCID-jc1e-8tt4-xqdn
summary
Opencontainers runc Incorrect Authorization vulnerability
runc 1.0.0-rc95 through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to `libcontainer/rootfs_linux.go`. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27561.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27561
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35018
published_at 2026-04-21T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35064
published_at 2026-04-18T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35099
published_at 2026-04-11T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35069
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35118
published_at 2026-04-02T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35147
published_at 2026-04-04T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35025
published_at 2026-04-07T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35079
published_at 2026-04-16T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35065
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
5
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
6
reference_url https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
7
reference_url https://github.com/opencontainers/runc/issues/3751
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://github.com/opencontainers/runc/issues/3751
8
reference_url https://github.com/opencontainers/runc/pull/3785
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/3785
9
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases/tag/v1.1.5
10
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27561
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-27561
22
reference_url https://security.netapp.com/advisory/ntap-20241206-0004
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241206-0004
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033520
reference_id 1033520
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033520
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175721
reference_id 2175721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175721
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/
reference_id ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/
reference_id DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/
reference_id FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/
reference_id FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/
29
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/
reference_id I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-26T04:00:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/
31
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
32
reference_url https://access.redhat.com/errata/RHSA-2023:3612
reference_id RHSA-2023:3612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3612
33
reference_url https://access.redhat.com/errata/RHSA-2023:5006
reference_id RHSA-2023:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5006
34
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
35
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
36
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
37
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
38
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2023-27561, GHSA-vpvm-3wq2-2wvm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc1e-8tt4-xqdn
7
url VCID-seds-dzew-jyfs
vulnerability_id VCID-seds-dzew-jyfs
summary
runc AppArmor bypass with symlinked /proc
### Impact
It was found that AppArmor, and potentially SELinux, can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration.

### Patches
Fixed in runc v1.1.5, by prohibiting symlinked `/proc`: https://github.com/opencontainers/runc/pull/3785

This PR fixes CVE-2023-27561 as well.

### Workarounds
Avoid using an untrusted container image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28642.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28642
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01328
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01825
published_at 2026-04-21T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01755
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01759
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01767
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01752
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0175
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01739
published_at 2026-04-16T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.0174
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/pull/3785
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:47Z/
url https://github.com/opencontainers/runc/pull/3785
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:47Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-28642
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-28642
8
reference_url https://security.netapp.com/advisory/ntap-20241206-0005
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241206-0005
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182883
reference_id 2182883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182883
10
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
11
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
12
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
13
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
14
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
15
reference_url https://access.redhat.com/errata/RHSA-2024:0564
reference_id RHSA-2024:0564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0564
16
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
17
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2023-28642, GHSA-g2j6-57v7-gm8c
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-seds-dzew-jyfs
8
url VCID-tsgr-5mwt-jkeh
vulnerability_id VCID-tsgr-5mwt-jkeh
summary
runc vulnerable to container breakout through process.cwd trickery and leaked fds
### Impact

In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from `runc exec`) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through `runc run` ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b").

Strictly speaking, while attack 3a is the most severe from a CVSS perspective, attacks 2 and 3b are arguably more dangerous in practice because they allow for a breakout from inside a container as opposed to requiring a user execute a malicious image. The reason attacks 1 and 3a are scored higher is because being able to socially engineer users is treated as a given for UI:R vectors, despite attacks 2 and 3b requiring far more minimal user interaction (just reasonable `runc exec` operations on a container the attacker has access to). In any case, all four attacks can lead to full control of the host system.

#### Attack 1: `process.cwd` "mis-configuration"

In runc 1.1.11 and earlier, several file descriptors were inadvertently leaked internally within runc into `runc init`, including a handle to the host's `/sys/fs/cgroup` (this leak was added in v1.0.0-rc93). If the container was configured to have `process.cwd` set to `/proc/self/fd/7/` (the actual fd can change depending on file opening order in `runc`), the resulting pid1 process will have a working directory in the host mount namespace and thus the spawned process can access the entire host filesystem. This alone is not an exploit against runc, however a malicious image could make any innocuous-looking non-`/` path a symlink to `/proc/self/fd/7/` and thus trick a user into starting a container whose binary has access to the host filesystem.

Furthermore, prior to runc 1.1.12, runc also did not verify that the final working directory was inside the container's mount namespace after calling `chdir(2)` (as we have already joined the container namespace, it was incorrectly assumed there would be no way to chdir outside the container after `pivot_root(2)`).

The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N (8.2, high severity).

Note that this attack requires a privileged user to be tricked into running a malicious container image. It should be noted that when using higher-level runtimes (such as Docker or Kubernetes), this exploit can be considered critical as it can be done remotely by anyone with the rights to start a container image (and can be exploited from within Dockerfiles using `ONBUILD` in the case of Docker).

#### Attack 2: `runc exec` container breakout

(This is a modification of attack 1, constructed to allow for a process inside a container to break out.)

The same fd leak and lack of verification of the working directory in attack 1 also apply to `runc exec`. If a malicious process inside the container knows that some administrative process will call `runc exec` with the `--cwd` argument and a given path, in most cases they can replace that path with a symlink to `/proc/self/fd/7/`. Once the container process has executed the container binary, `PR_SET_DUMPABLE` protections no longer apply and the attacker can open `/proc/$exec_pid/cwd` to get access to the host filesystem.

`runc exec` defaults to a cwd of `/` (which cannot be replaced with a symlink), so this attack depends on the attacker getting a user (or some administrative process) to use `--cwd` and figuring out what path the target working directory is. Note that if the target working directory is a parent of the program binary being executed, the attacker might be unable to replace the path with a symlink (the `execve` will fail in most cases, unless the host filesystem layout specifically matches the container layout in specific ways and the attacker knows which binary the `runc exec` is executing).

The CVSS score for this attack is CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N (7.2, high severity).

#### Attacks 3a and 3b: `process.args` host binary overwrite attack

(These are modifications of attacks 1 and 2, constructed to overwrite a host binary by using `execve` to bring a magic-link reference into the container.)

Attacks 1 and 2 can be adapted to overwrite a host binary by using a path like `/proc/self/fd/7/../../../bin/bash` as the `process.args` binary argument, causing a host binary to be executed by a container process. The `/proc/$pid/exe` handle can then be used to overwrite the host binary, as seen in CVE-2019-5736 (note that the same `#!` trick can be used to avoid detection as an attacker). As the overwritten binary could be something like `/bin/bash`, as soon as a privileged user executes the target binary on the host, the attacker can pivot to gain full access to the host.

For the purposes of CVSS scoring:

* Attack 3a is attack 1 but adapted to overwrite a host binary, where a malicious image is set up to execute `/proc/self/fd/7/../../../bin/bash` and run a shell script that overwrites `/proc/self/exe`, overwriting the host copy of `/bin/bash`. The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H (8.6, high severity).
* Attack 3b is attack 2 but adapted to overwrite a host binary, where the malicious container process overwrites all of the possible `runc exec` target binaries inside the container (such as `/bin/bash`) such that a host target binary is executed and then the container process opens `/proc/$pid/exe` to get access to the host binary and overwrite it. The CVSS score for this attack is CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H (8.2, high severity).

As mentioned in attack 1, while 3b is scored lower it is more dangerous in practice as it doesn't require a user to run a malicious image.

### Patches
runc 1.1.12 has been released, and includes patches for this issue. Note that there are four separate fixes applied:

* Checking that the working directory is actually inside the container by checking whether `os.Getwd` returns `ENOENT` (Linux provides a way of detecting if cwd is outside the current namespace root). This explicitly blocks runc from executing a container process when inside a non-container path and thus eliminates attacks 1 and 2 even in the case of fd leaks.
* Close all internal runc file descriptors in the final stage of `runc init`, right before `execve`. This ensures that internal file descriptors cannot be used as an argument to `execve` and thus eliminates attacks 3a and 3b, even in the case of fd leaks. This requires hooking into some Go runtime internals to make sure we don't close critical Go internal file descriptors.
* Fixing the specific fd leaks that made these bug exploitable (mark `/sys/fs/cgroup` as `O_CLOEXEC` and backport a fix for some `*os.File` leaks).
* In order to protect against future `runc init` file descriptor leaks, mark all non-stdio files as `O_CLOEXEC` before executing `runc init`.

### Other Runtimes

We have discovered that several other container runtimes are either potentially vulnerable to similar attacks, or do not have sufficient protection against attacks of this nature. We recommend other container runtime authors look at [our patches](#Patches) and make sure they at least add a `getcwd() != ENOENT` check as well as consider whether `close_range(3, UINT_MAX, CLOSE_RANGE_CLOEXEC)` before executing their equivalent of `runc init` is appropriate.

 * crun 1.12 does not leak any useful file descriptors into the `runc init`-equivalent process (so this attack is _not exploitable_ as far as we can tell), but no care is taken to make sure all non-stdio files are `O_CLOEXEC` and there is no check after `chdir(2)` to ensure the working directory is inside the container. If a file descriptor happened to be leaked in the future, this could be exploitable. In addition, any file descriptors passed to `crun` are not closed until the container process is executed, meaning that easily-overlooked programming errors by users of `crun` can lead to these attacks becoming exploitable.
 * youki 0.3.1 does not leak any useful file descriptors into the `runc init`-equivalent process (so this attack is _not exploitable_ as far as we can tell) however this appears to be pure luck. `youki` does leak a directory file descriptor from the host mount namespace, but it just so happens that the directory is the rootfs of the container (which then gets `pivot_root`'d into and so ends up as a in-root path thanks to `chroot_fs_refs`). In addition, no care is taken to make sure all non-stdio files are `O_CLOEXEC` and there is no check after `chdir(2)` to ensure the working directory is inside the container. If a file descriptor happened to be leaked in the future, this could be exploitable. In addition, any file descriptors passed to `youki` are not closed until the container process is executed, meaning that easily-overlooked programming errors by users of `youki` can lead to these attacks becoming exploitable.
 * LXC 5.0.3 does not appear to leak any useful file descriptors, and they have comments noting the importance of not leaking file descriptors in `lxc-attach`. However, they don't seem to have any proactive protection against file descriptor leaks at the point of `chdir` such as using `close_range(...)` (they do have RAII-like `__do_fclose` closers but those don't necessarily stop all leaks in this context) nor do they have any check after `chdir(2)` to ensure the working directory is inside the container. Unfortunately it seems they cannot use `CLOSE_RANGE_CLOEXEC` because they don't need to re-exec themselves.

### Workarounds
For attacks 1 and 2, only permit containers (and `runc exec`) to use a `process.cwd` of `/`. It is not possible for `/` to be replaced with a symlink (the path is resolved from within the container's mount namespace, and you cannot change the root of a mount namespace or an fs root to a symlink).

For attacks 1 and 3a, only permit users to run trusted images.

For attack 3b, there is no practical workaround other than never using `runc exec` because any binary you try to execute with `runc exec` could end up being a malicious binary target.

### See Also
* https://www.cve.org/CVERecord?id=CVE-2024-21626
* https://github.com/opencontainers/runc/releases/tag/v1.1.12
* The runc 1.1.12 merge commit https://github.com/opencontainers/runc/commit/a9833ff391a71b30069a6c3f816db113379a4346, which contains the following security patches:
  * https://github.com/opencontainers/runc/commit/506552a88bd3455e80a9b3829568e94ec0160309
  * https://github.com/opencontainers/runc/commit/0994249a5ec4e363bfcf9af58a87a722e9a3a31b
  * https://github.com/opencontainers/runc/commit/fbe3eed1e568a376f371d2ced1b4ac16b7d7adde
  * https://github.com/opencontainers/runc/commit/284ba3057e428f8d6c7afcc3b0ac752e525957df
  * https://github.com/opencontainers/runc/commit/b6633f48a8c970433737b9be5bfe4f25d58a5aa7
  * https://github.com/opencontainers/runc/commit/683ad2ff3b01fb142ece7a8b3829de17150cf688
  * https://github.com/opencontainers/runc/commit/e9665f4d606b64bf9c4652ab2510da368bfbd951

### Credits

Thanks to Rory McNamara from Snyk for discovering and disclosing the original vulnerability (attack 1) to Docker, @lifubang from acmcoder for discovering how to adapt the attack to overwrite host binaries (attack 3a), and Aleksa Sarai from SUSE for discovering how to adapt the attacks to work as container breakouts using `runc exec` (attacks 2 and 3b).
references
0
reference_url http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21626.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21626.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21626
reference_id
reference_type
scores
0
value 0.03873
scoring_system epss
scoring_elements 0.88248
published_at 2026-04-21T12:55:00Z
1
value 0.05303
scoring_system epss
scoring_elements 0.90041
published_at 2026-04-16T12:55:00Z
2
value 0.05303
scoring_system epss
scoring_elements 0.90042
published_at 2026-04-18T12:55:00Z
3
value 0.05634
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-13T12:55:00Z
4
value 0.06756
scoring_system epss
scoring_elements 0.91292
published_at 2026-04-11T12:55:00Z
5
value 0.06756
scoring_system epss
scoring_elements 0.91295
published_at 2026-04-12T12:55:00Z
6
value 0.06756
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-08T12:55:00Z
7
value 0.06756
scoring_system epss
scoring_elements 0.91266
published_at 2026-04-07T12:55:00Z
8
value 0.06756
scoring_system epss
scoring_elements 0.91285
published_at 2026-04-09T12:55:00Z
9
value 0.07448
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-02T12:55:00Z
10
value 0.07448
scoring_system epss
scoring_elements 0.91734
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21626
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
6
reference_url https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf
7
reference_url https://github.com/opencontainers/runc/releases/tag/v1.1.12
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/releases/tag/v1.1.12
8
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
9
reference_url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.debian.org/debian-lts-announce/2024/02/msg00005.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21626
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21626
13
reference_url http://www.openwall.com/lists/oss-security/2024/02/01/1
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://www.openwall.com/lists/oss-security/2024/02/01/1
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/02/3
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url http://www.openwall.com/lists/oss-security/2024/02/02/3
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062532
reference_id 1062532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062532
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258725
reference_id 2258725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258725
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
reference_id 2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NLXNE23Q5ESQUAI22Z7A63JX2WMPJ2J/
18
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
19
reference_url https://access.redhat.com/errata/RHSA-2024:0645
reference_id RHSA-2024:0645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0645
20
reference_url https://access.redhat.com/errata/RHSA-2024:0662
reference_id RHSA-2024:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0662
21
reference_url https://access.redhat.com/errata/RHSA-2024:0666
reference_id RHSA-2024:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0666
22
reference_url https://access.redhat.com/errata/RHSA-2024:0670
reference_id RHSA-2024:0670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0670
23
reference_url https://access.redhat.com/errata/RHSA-2024:0684
reference_id RHSA-2024:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0684
24
reference_url https://access.redhat.com/errata/RHSA-2024:0717
reference_id RHSA-2024:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0717
25
reference_url https://access.redhat.com/errata/RHSA-2024:0748
reference_id RHSA-2024:0748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0748
26
reference_url https://access.redhat.com/errata/RHSA-2024:0752
reference_id RHSA-2024:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0752
27
reference_url https://access.redhat.com/errata/RHSA-2024:0755
reference_id RHSA-2024:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0755
28
reference_url https://access.redhat.com/errata/RHSA-2024:0756
reference_id RHSA-2024:0756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0756
29
reference_url https://access.redhat.com/errata/RHSA-2024:0757
reference_id RHSA-2024:0757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0757
30
reference_url https://access.redhat.com/errata/RHSA-2024:0758
reference_id RHSA-2024:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0758
31
reference_url https://access.redhat.com/errata/RHSA-2024:0759
reference_id RHSA-2024:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0759
32
reference_url https://access.redhat.com/errata/RHSA-2024:0760
reference_id RHSA-2024:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0760
33
reference_url https://access.redhat.com/errata/RHSA-2024:0764
reference_id RHSA-2024:0764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0764
34
reference_url https://access.redhat.com/errata/RHSA-2024:10149
reference_id RHSA-2024:10149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10149
35
reference_url https://access.redhat.com/errata/RHSA-2024:10520
reference_id RHSA-2024:10520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10520
36
reference_url https://access.redhat.com/errata/RHSA-2024:10525
reference_id RHSA-2024:10525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10525
37
reference_url https://access.redhat.com/errata/RHSA-2024:10841
reference_id RHSA-2024:10841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10841
38
reference_url https://access.redhat.com/errata/RHSA-2024:1270
reference_id RHSA-2024:1270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1270
39
reference_url https://access.redhat.com/errata/RHSA-2024:4597
reference_id RHSA-2024:4597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4597
40
reference_url https://access.redhat.com/errata/RHSA-2025:0115
reference_id RHSA-2025:0115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0115
41
reference_url https://access.redhat.com/errata/RHSA-2025:0650
reference_id RHSA-2025:0650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0650
42
reference_url https://access.redhat.com/errata/RHSA-2025:1711
reference_id RHSA-2025:1711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1711
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/
reference_id SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-19T04:01:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/
44
reference_url https://usn.ubuntu.com/6619-1/
reference_id USN-6619-1
reference_type
scores
url https://usn.ubuntu.com/6619-1/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.12%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.12%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.12%252Bds1-1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
5
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2024-21626, GHSA-xr7r-f8xq-vfvv
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsgr-5mwt-jkeh
9
url VCID-v2ys-xbn5-guh4
vulnerability_id VCID-v2ys-xbn5-guh4
summary
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
### Impact
It was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons:
1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl)
2. or, when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare)

A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host .
Other users's cgroup hierarchies are not affected.

### Patches
v1.1.5 (planned)

### Workarounds
- Condition 1: Unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts.
- Condition 2 (very rare): add `/sys/fs/cgroup` to `maskedPaths`
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25809.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25809
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10176
published_at 2026-04-11T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10045
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10115
published_at 2026-04-13T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-12T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10103
published_at 2026-04-04T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10001
published_at 2026-04-07T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10077
published_at 2026-04-08T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10138
published_at 2026-04-09T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.11946
published_at 2026-04-18T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12063
published_at 2026-04-21T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1195
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:19Z/
url https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17
6
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T16:02:19Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25809
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25809
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182884
reference_id 2182884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182884
9
reference_url https://security.gentoo.org/glsa/202408-25
reference_id GLSA-202408-25
reference_type
scores
url https://security.gentoo.org/glsa/202408-25
10
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
11
reference_url https://access.redhat.com/errata/RHSA-2023:6380
reference_id RHSA-2023:6380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6380
12
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
13
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
14
reference_url https://usn.ubuntu.com/6088-1/
reference_id USN-6088-1
reference_type
scores
url https://usn.ubuntu.com/6088-1/
15
reference_url https://usn.ubuntu.com/6088-2/
reference_id USN-6088-2
reference_type
scores
url https://usn.ubuntu.com/6088-2/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
5
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2023-25809, GHSA-m8cg-xc2p-r3fc
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2ys-xbn5-guh4
10
url VCID-vkba-amt4-m7e6
vulnerability_id VCID-vkba-amt4-m7e6
summary
Privilege Elevation in runc
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1034.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1034.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2634.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-2634.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3697.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3697.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3697
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.179
published_at 2026-04-13T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17949
published_at 2026-04-12T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17993
published_at 2026-04-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17888
published_at 2026-04-21T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17842
published_at 2026-04-16T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18127
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18073
published_at 2026-04-02T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17912
published_at 2026-04-01T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17852
published_at 2026-04-18T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17976
published_at 2026-04-09T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17916
published_at 2026-04-08T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17828
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/docker/docker/issues/21436
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/issues/21436
8
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
9
reference_url https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
10
reference_url https://github.com/opencontainers/runc/pull/708
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/708
11
reference_url https://github.com/opencontainers/runc/releases/tag/v0.1.0
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/releases/tag/v0.1.0
12
reference_url https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3697
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-3697
14
reference_url https://pkg.go.dev/vuln/GO-2021-0070
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0070
15
reference_url https://rhn.redhat.com/errata/RHSA-2016-1034.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1034.html
16
reference_url https://rhn.redhat.com/errata/RHSA-2016-2634.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-2634.html
17
reference_url https://security.gentoo.org/glsa/201612-28
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-28
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329450
reference_id 1329450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329450
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://access.redhat.com/errata/RHSA-2016:1034
reference_id RHSA-2016:1034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1034
23
reference_url https://access.redhat.com/errata/RHSA-2016:2634
reference_id RHSA-2016:2634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2634
fixed_packages
0
url pkg:deb/debian/runc@0.1.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/runc@0.1.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@0.1.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2016-3697, GHSA-q3j5-32m5-58c2
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkba-amt4-m7e6
11
url VCID-x2zb-mehm-ebge
vulnerability_id VCID-x2zb-mehm-ebge
summary
runc can be confused to create empty files/directories on the host
### Impact
runc 1.1.13 and earlier as well as 1.2.0-rc2 and earlier can be tricked into
creating empty files or directories in arbitrary locations in the host
filesystem by sharing a volume between two containers and exploiting a race
with os.MkdirAll. While this can be used to create empty files, existing
files **will not** be truncated.

An attacker must have the ability to start containers using some kind of custom
volume configuration. Containers using user namespaces are still affected, but
the scope of places an attacker can create inodes can be significantly reduced.
Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block
this attack -- we suspect the industry standard SELinux policy may restrict
this attack's scope but the exact scope of protection hasn't been analysed.

This is exploitable using runc directly as well as through Docker and
Kubernetes.

The CVSS score for this vulnerability is
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N (Low severity, 3.6).

### Workarounds
Using user namespaces restricts this attack fairly significantly such that the
attacker can only create inodes in directories that the remapped root
user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use
/etc/sub[ug]id), this in practice means that an attacker would only be able to
create inodes in world-writable directories.

A strict enough SELinux or AppArmor policy could in principle also restrict the
scope if a specific label is applied to the runc runtime, though we haven't
thoroughly tested to what extent the standard existing policies block this
attack nor what exact policies are needed to sufficiently restrict this attack.

### Patches
Fixed in runc v1.1.14 and v1.2.0-rc3.

* `main` patches:
  * https://github.com/opencontainers/runc/pull/4359
  *  https://github.com/opencontainers/runc/commit/63c2908164f3a1daea455bf5bcd8d363d70328c7
* `release-1.1` patches:
  * https://github.com/opencontainers/runc/commit/8781993968fd964ac723ff5f360b6f259e809a3e
  * https://github.com/opencontainers/runc/commit/f0b652ea61ff6750a8fcc69865d45a7abf37accf

### Credits
Thanks to Rodrigo Campos Catelin (@rata) and Alban Crequy (@alban) from
Microsoft for discovering and reporting this vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45310.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45310
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.3491
published_at 2026-04-21T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34954
published_at 2026-04-18T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34971
published_at 2026-04-16T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34932
published_at 2026-04-13T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-07T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34992
published_at 2026-04-11T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34988
published_at 2026-04-09T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34959
published_at 2026-04-08T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34956
published_at 2026-04-12T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-02T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/63c2908164f3a1daea455bf5bcd8d363d70328c7
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T20:03:49Z/
url https://github.com/opencontainers/runc/commit/63c2908164f3a1daea455bf5bcd8d363d70328c7
6
reference_url https://github.com/opencontainers/runc/commit/8781993968fd964ac723ff5f360b6f259e809a3e
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T20:03:49Z/
url https://github.com/opencontainers/runc/commit/8781993968fd964ac723ff5f360b6f259e809a3e
7
reference_url https://github.com/opencontainers/runc/commit/f0b652ea61ff6750a8fcc69865d45a7abf37accf
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T20:03:49Z/
url https://github.com/opencontainers/runc/commit/f0b652ea61ff6750a8fcc69865d45a7abf37accf
8
reference_url https://github.com/opencontainers/runc/pull/4359
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T20:03:49Z/
url https://github.com/opencontainers/runc/pull/4359
9
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-jfvp-7x6p-h2pv
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T20:03:49Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-jfvp-7x6p-h2pv
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-45310
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-45310
11
reference_url https://security.netapp.com/advisory/ntap-20250221-0008
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250221-0008
12
reference_url http://www.openwall.com/lists/oss-security/2024/09/03/1
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/U:Green
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/09/03/1
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082865
reference_id 1082865
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082865
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2309336
reference_id 2309336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2309336
fixed_packages
0
url pkg:deb/debian/runc@1.1.15%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-1%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2024-45310, GHSA-jfvp-7x6p-h2pv
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x2zb-mehm-ebge
12
url VCID-y6tt-h3zz-ukev
vulnerability_id VCID-y6tt-h3zz-ukev
summary docker: Ambient capability usage in containers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8867.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8867
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-01T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.6029
published_at 2026-04-02T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60315
published_at 2026-04-04T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60283
published_at 2026-04-07T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60333
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60348
published_at 2026-04-09T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60369
published_at 2026-04-11T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60356
published_at 2026-04-12T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60337
published_at 2026-04-13T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60378
published_at 2026-04-16T12:55:00Z
10
value 0.00395
scoring_system epss
scoring_elements 0.60386
published_at 2026-04-18T12:55:00Z
11
value 0.00395
scoring_system epss
scoring_elements 0.60375
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8867
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1390163
reference_id 1390163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1390163
3
reference_url https://access.redhat.com/errata/RHSA-2020:2653
reference_id RHSA-2020:2653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2653
fixed_packages
0
url pkg:deb/debian/runc@0?distro=trixie
purl pkg:deb/debian/runc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@0%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2016-8867
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6tt-h3zz-ukev
13
url VCID-zex4-9xyf-6yf1
vulnerability_id VCID-zex4-9xyf-6yf1
summary
Multiple vulnerabilities have been discovered in runC, the worst of
    which may lead to privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html
3
reference_url https://access.redhat.com/errata/RHSA-2019:3940
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3940
4
reference_url https://access.redhat.com/errata/RHSA-2019:4074
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4074
5
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16884.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16884.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16884
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56364
published_at 2026-04-09T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-08T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56308
published_at 2026-04-07T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57348
published_at 2026-04-21T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57389
published_at 2026-04-11T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57374
published_at 2026-04-16T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57369
published_at 2026-04-18T12:55:00Z
7
value 0.00485
scoring_system epss
scoring_elements 0.65308
published_at 2026-04-02T12:55:00Z
8
value 0.00485
scoring_system epss
scoring_elements 0.65333
published_at 2026-04-04T12:55:00Z
9
value 0.00485
scoring_system epss
scoring_elements 0.65258
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16884
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70
11
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
12
reference_url https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
13
reference_url https://github.com/opencontainers/runc/issues/2128
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/issues/2128
14
reference_url https://github.com/opencontainers/runc/pull/2129
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2129
15
reference_url https://github.com/opencontainers/runc/pull/2130
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc/pull/2130
16
reference_url https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
17
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/02/msg00016.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16884
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-16884
26
reference_url https://pkg.go.dev/vuln/GO-2021-0085
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0085
27
reference_url https://security.netapp.com/advisory/ntap-20220221-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220221-0004
28
reference_url https://security.netapp.com/advisory/ntap-20220221-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220221-0004/
29
reference_url https://usn.ubuntu.com/4297-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4297-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1757214
reference_id 1757214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1757214
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942026
reference_id 942026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942026
32
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942027
reference_id 942027
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942027
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
reference_id cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
60
reference_url https://security.gentoo.org/glsa/202003-21
reference_id GLSA-202003-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202003-21
61
reference_url https://access.redhat.com/errata/RHSA-2020:1234
reference_id RHSA-2020:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1234
62
reference_url https://usn.ubuntu.com/4297-1/
reference_id USN-4297-1
reference_type
scores
url https://usn.ubuntu.com/4297-1/
63
reference_url https://usn.ubuntu.com/USN-4867-1/
reference_id USN-USN-4867-1
reference_type
scores
url https://usn.ubuntu.com/USN-4867-1/
fixed_packages
0
url pkg:deb/debian/runc@1.0.0~rc9%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc9%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc9%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
aliases CVE-2019-16884, GHSA-fgv8-vj5c-2ppq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zex4-9xyf-6yf1
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie