Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mt76-ah1b-s3gc
Summary
runc container escape via "masked path" abuse due to mount race conditions
### Impact ###  
The OCI runtime specification has a `maskedPaths` feature that allows for files or directories to be "masked" by placing a mount on top of them to conceal their contents. This is primarily intended to protect against privileged users in non-user-namespaced from being able to write to files or access directories that would either provide sensitive information about the host to containers or allow containers to perform destructive or other privileged operations on the host (examples include `/proc/kcore`, `/proc/timer_list`, `/proc/acpi`, and `/proc/keys`).  

`maskedPaths` can be used to either mask a directory or a file -- directories are masked using a new read-only `tmpfs` instance that is mounted on top of the masked path, while files are masked by bind-mounting the container's `/dev/null` on top of the masked path.  

In all known versions of runc, when using the container's `/dev/null` to mask files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's `/dev/null`) was actually a real `/dev/null` inode. While `/dev/null` is usually created by runc when doing container creation, it is possible for an attacker to create a `/dev/null` or modify the `/dev/null` inode created by runc through race conditions with other containers sharing mounts (runc has also verified this attack is possible to exploit using a standard Dockerfile with `docker buildx build` as that also permits triggering parallel execution of containers with custom shared mounts configured).  

This could lead to two separate issues:  

#### Attack 1: Arbitrary Mount Gadget (leading to Host Information Disclosure, Host Denial of Service, or Container Escape) ####  
By replacing `/dev/null` with a symlink to an attacker-controlled path, an attacker could cause runc to bind-mount an arbitrary source path to a path inside the container. This could lead to:  
* **Host Denial of Service**: By bind-mounting files such as `/proc/sysrq-trigger`, the attacker can gain access to a read-write version of files which can be destructive to write to (`/proc/sysrq-trigger` would allow an attacker to trigger a kernel panic, shutting down the machine, or causing the machine to freeze without rebooting).  
* **Container Escape**: By bind-mounting `/proc/sys/kernel/core_pattern`, the attacker can reconfigure a coredump helper -- as kernel upcalls are not namespaced, the configured binary (which could be a container binary or a host binary with a malicious command-line) will run with full privileges on the host system. Thus, the attacker can simply trigger a coredump and gain complete root privileges over the host.  

Note that while `config.json` allows users to bind-mount arbitrary paths (and thus an attacker that can modify `config.json` arbitrarily could gain the same access as this exploit), because `maskedPaths` is applied by almost all higher-level container runtimes (and thus provides a guaranteed mount source) this flaw effectively allows any attacker that can spawn containers (with some degree of control over what kinds of containers are being spawned) to achieve the above goals. 

#### Attack 2: Bypassing `maskedPaths` ####  
While investigating Attack 1, runc discovered that the runc validation mechanism when bind-mounting `/dev/null` for `maskedPaths` would ignore `ENOENT` errors -- meaning that if an attacker deleted `/dev/null` before runc did the bind-mount, runc would silently skip applying `maskedPaths` for the container. (The original purpose of this `ENOENT`-ignore behaviour was to permit configurations where `maskedPaths` references non-existent files, but runc did not consider that the source path could also not exist in this kind of race-attack scenario.)  

With `maskedPaths` rendered inoperative, an attacker would be able to access sensitive host information from files in `/proc` that would usually be masked (such as `/proc/kcore`). However, note that `/proc/sys` and `/proc/sysrq-trigger` are mounted read-only rather than being masked with files, so this attack variant will not allow the same breakout or host denial of service attacks as in Attack 1. 

### Patches ###  
This advisory is being published as part of a set of three advisories:  
* CVE-2025-31133
* CVE-2025-52881
* CVE-2025-52565

The patches fixing this issue have accordingly been combined into a single patchset. The following patches from that patchset resolve the issues in this advisory:  
* db19bbed5348 ("internal/sys: add VerifyInode helper")  
* 8476df83b534 ("libct: add/use isDevNull, verifyDevNull")  
* 1a30a8f3d921 ("libct: maskPaths: only ignore ENOENT on mount dest")  
* 5d7b24240724 ("libct: maskPaths: don't rely on ENOTDIR for mount")  

runc 1.2.8, 1.3.3, and 1.4.0-rc.3 have been released and all contain fixes for these issues. As per [runc's new release model](https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md), runc 1.1.x and earlier are no longer supported and thus have not been patched.  https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md  

### Mitigations ###  
- Use containers with user namespaces (with the host root user not mapped into the container's user namespace). This will block most of the most serious aspects of these attacks, as the `procfs` files used for the container breakout use Unix DAC permissions and user namespaced users will not have access to the relevant files.

  runc would also like to take this opportunity to re-iterate that runc **strongly** recommend all users use user namespaced containers. They have proven to be one of the best security hardening mechanisms against container breakouts, and the kernel applies additional restrictions to user namespaced containers above and beyond the user remapping functionality provided. With the advent of id-mapped mounts (Linux 5.12), there is very little reason to not use user namespaces for most applications. Note that using user namespaces to configure your container does not mean you have to enable unprivileged user namespace creation *inside* the container -- most container runtimes apply a seccomp-bpf profile which blocks `unshare(CLONE_NEWUSER)` inside containers regardless of whether the container itself uses user namespaces.

  Rootless containers can provide even more protection if your configuration can use them -- by having runc itself be an unprivileged process, in general you would expect the impact scope of a runc bug to be less severe as it would only have the privileges afforded to the host user which spawned runc. 

- For non-user namespaced containers, configure all containers you spawn to not permit processes to run with root privileges. In most cases this would require configuring the container to use a non-root user and enabling `noNewPrivileges` to disable any setuid or set-capability binaries. (Note that this is runc's general recommendation for a secure container setup -- it is very difficult, if not impossible, to run an untrusted program with root privileges safely.) If you need to use `ping` in your containers, there is a `net.ipv4.ping_group_range` sysctl that can be used to allow unprivileged users to ping without requiring setuid or set-capability binaries.  
 - Do not run untrusted container images from unknown or unverified sources.  
 - Depending on the configuration of `maskedPaths`, an AppArmor profile (such as the default one applied by higher level runtimes including Docker and Podman) can block write attempts to most of `/proc` and `/sys`. This means that even with a procfs file maliciously bind-mounted to a `maskedPaths` target, all of the targets of `maskedPaths` in the default configuration of runtimes such as Docker or Podman will still not permit write access to said files. However, if a container is configured with a `maskedPaths` that is not protected by AppArmor then the same attack can be carried out. Please note that CVE-2025-52881 allows an attacker to bypass LSM labels, and so this mitigation is not that helpful when considered in combination with CVE-2025-52881.  
 - Based on runc's analysis, SELinux policies have a limited effect when trying to protect against this attack. The reason is that the `/dev/null` bind-mount gets implicitly relabelled with `context=...` set to the container's SELinux context, and thus the container process will have access to the source of the bind-mount even if they otherwise wouldn't.  
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm  

### Other Runtimes ###  
As this vulnerability boils down to a fairly easy-to-make logic bug, runc has provided information to other OCI (crun, youki) and non-OCI (LXC) container runtimes about this vulnerability. Based on discussions with other runtimes, it seems that crun and youki may have similar security issues and will release a coordinated security release along with runc. LXC appears to also be vulnerable in some aspects, but [their security stance](https://linuxcontainers.org/lxc/security/) is (understandably) that non-user-namespaced containers are fundamentally insecure by design.  
https://linuxcontainers.org/lxc/security/  

### Credits ###  
Thanks to Lei Wang (@ssst0n3 from Huawei) for finding and reporting the original vulnerability (Attack 1), and Li Fubang (@lifubang from acmcoder.com, CIIC) for discovering another attack vector (Attack 2) based on @ssst0n3's initial findings.
Aliases
0
alias CVE-2025-31133
1
alias GHSA-9493-h29p-rfm2
Fixed_packages
0
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.22&reponame=community
1
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
2
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=edge&reponame=community
3
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=edge&reponame=community
4
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=edge&reponame=community
5
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=edge&reponame=community
7
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=edge&reponame=community
8
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=edge&reponame=community
9
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=edge&reponame=community
10
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=edge&reponame=community
11
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.22&reponame=community
12
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.22&reponame=community
13
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
14
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.22&reponame=community
15
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.22&reponame=community
16
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.22&reponame=community
17
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
18
url pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=aarch64&distroversion=v3.23&reponame=community
19
url pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armhf&distroversion=v3.23&reponame=community
20
url pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=armv7&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=armv7&distroversion=v3.23&reponame=community
21
url pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
22
url pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community
23
url pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
24
url pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=s390x&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=s390x&distroversion=v3.23&reponame=community
25
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86&distroversion=v3.23&reponame=community
26
url pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/runc@1.3.3-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/runc@1.3.3-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
27
url pkg:deb/debian/runc@1.0.3%2Bds1-1
purl pkg:deb/debian/runc@1.0.3%2Bds1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.3%252Bds1-1
28
url pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.3.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2%3Fdistro=trixie
29
url pkg:deb/debian/runc@1.3.3%2Bds1-2
purl pkg:deb/debian/runc@1.3.3%2Bds1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.3%252Bds1-2
30
url pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
purl pkg:deb/debian/runc@1.3.5%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.3.5%252Bds1-1%3Fdistro=trixie
31
url pkg:golang/github.com/opencontainers/runc@1.2.8
purl pkg:golang/github.com/opencontainers/runc@1.2.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.2.8
32
url pkg:golang/github.com/opencontainers/runc@1.3.3
purl pkg:golang/github.com/opencontainers/runc@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.3.3
33
url pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
purl pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/opencontainers/runc@1.4.0-rc.3
Affected_packages
0
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5
1
url pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/runc@1.0.0~rc93%2Bds1-5%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.0.0~rc93%252Bds1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1
3
url pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/runc@1.1.5%2Bds1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
3
vulnerability VCID-x2zb-mehm-ebge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.5%252Bds1-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/runc@1.1.15%2Bds1-2
purl pkg:deb/debian/runc@1.1.15%2Bds1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2
5
url pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
purl pkg:deb/debian/runc@1.1.15%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/runc@1.1.15%252Bds1-2%3Fdistro=trixie
6
url pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
purl pkg:rpm/redhat/runc@4:1.2.5-3?arch=el9_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.5-3%3Farch=el9_6
7
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_0
8
url pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
purl pkg:rpm/redhat/runc@4:1.2.9-1?arch=el9_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1%3Farch=el9_4
9
url pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
purl pkg:rpm/redhat/runc@4:1.2.9-1.el9_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bq3a-psx3-5kh8
1
vulnerability VCID-mt76-ah1b-s3gc
2
vulnerability VCID-vk37-s4p6-fufm
3
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.el9_2%3Farch=1
10
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.16%3Farch=el8
11
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el8
12
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.17%3Farch=el9
13
url pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
purl pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.2.9-1.rhaos4.18%3Farch=el8
14
url pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
purl pkg:rpm/redhat/runc@4:1.3.0-4?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mt76-ah1b-s3gc
1
vulnerability VCID-vk37-s4p6-fufm
2
vulnerability VCID-wxsf-mu1t-aqa4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/runc@4:1.3.0-4%3Farch=el9_7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31133.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31133
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02614
published_at 2026-04-12T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02629
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02652
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02632
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02628
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02612
published_at 2026-04-13T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02873
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03727
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04938
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05085
published_at 2026-04-21T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06666
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/opencontainers/runc
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/opencontainers/runc
5
reference_url https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
6
reference_url https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
7
reference_url https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
8
reference_url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
9
reference_url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-06T19:03:45Z/
url https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-31133
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-31133
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
reference_id 1120140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120140
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404705
reference_id 2404705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404705
13
reference_url https://access.redhat.com/errata/RHSA-2025:19927
reference_id RHSA-2025:19927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19927
14
reference_url https://access.redhat.com/errata/RHSA-2025:20957
reference_id RHSA-2025:20957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20957
15
reference_url https://access.redhat.com/errata/RHSA-2025:21232
reference_id RHSA-2025:21232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21232
16
reference_url https://access.redhat.com/errata/RHSA-2025:21795
reference_id RHSA-2025:21795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21795
17
reference_url https://access.redhat.com/errata/RHSA-2025:21824
reference_id RHSA-2025:21824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21824
18
reference_url https://access.redhat.com/errata/RHSA-2026:0315
reference_id RHSA-2026:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0315
19
reference_url https://access.redhat.com/errata/RHSA-2026:0331
reference_id RHSA-2026:0331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0331
20
reference_url https://access.redhat.com/errata/RHSA-2026:0418
reference_id RHSA-2026:0418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0418
21
reference_url https://access.redhat.com/errata/RHSA-2026:0425
reference_id RHSA-2026:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0425
22
reference_url https://access.redhat.com/errata/RHSA-2026:0676
reference_id RHSA-2026:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0676
23
reference_url https://access.redhat.com/errata/RHSA-2026:0701
reference_id RHSA-2026:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0701
24
reference_url https://access.redhat.com/errata/RHSA-2026:0995
reference_id RHSA-2026:0995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0995
25
reference_url https://access.redhat.com/errata/RHSA-2026:1540
reference_id RHSA-2026:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1540
26
reference_url https://access.redhat.com/errata/RHSA-2026:2681
reference_id RHSA-2026:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2681
27
reference_url https://access.redhat.com/errata/RHSA-2026:4531
reference_id RHSA-2026:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4531
28
reference_url https://access.redhat.com/errata/RHSA-2026:4693
reference_id RHSA-2026:4693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4693
29
reference_url https://access.redhat.com/errata/RHSA-2026:6492
reference_id RHSA-2026:6492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6492
30
reference_url https://access.redhat.com/errata/RHSA-2026:8325
reference_id RHSA-2026:8325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8325
31
reference_url https://usn.ubuntu.com/7851-1/
reference_id USN-7851-1
reference_type
scores
url https://usn.ubuntu.com/7851-1/
Weaknesses
0
cwe_id 363
name Race Condition Enabling Link Following
description The product checks the status of a file or directory before accessing it, which produces a race condition in which the file can be replaced with a link before the access is performed, causing the product to access the wrong file.
1
cwe_id 61
name UNIX Symbolic Link (Symlink) Following
description The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
2
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mt76-ah1b-s3gc